Who we are
We are one of the largest Polish ICT companies implementing modern technologies. The company was founded in 1988 as Przedsiębiorstwo Wdrażnia Postępu Technicznego WASKO Sp. z o. o. The company has been developing very dynamically since its founding, building the Capital Group. Individual companies of the Group have participated in the computerization of key sectors of the economy and the government and local government administration sector.
The head office is located in Gliwice, and the company’s branches are located in major cities in the country. We employ over 1,200 specialists in the capital group with high professional and managerial qualifications. Since 2001, the company’s shares have been listed on the Warsaw Stock Exchange.
Our projects
Tunnel mapping
in three-dimensional technology
Mapping of the tunnel in three-dimensional technology
The simulator is designed to reproduce the conditions in the tunnel and the devices that may actually be there. It has the ability to simulate the image from cameras, information that is displayed on variable message signs and to simulate the control of signaling devices, induction loops, ventilation and power supply.
It is a faithful representation of the tunnel environment, which enables personnel training as well as verification of knowledge and behavior in hazardous situations. The software allows you to create test scenarios that are run during tests and training.
NEDAPS allows for graphical modeling of any processes, services and configurations performed by devices and customer systems and their execution in order to perform specific tasks and functions.
“Energy from the sun”, as this term is commonly used, is the simplest method of obtaining electricity using renewable sources, which is currently undergoing dynamic development. Investors are eagerly interested in this way of investing their funds, because, with low operating costs, virtually maintenance-free operation, they ensure a stable income for a long time.
NEDAPS SEC is a tool for every data center, company and institution that want to consciously manage their IT environment, both hardware and virtual, in terms of its inventory and ongoing control of vulnerabilities (network threats).