<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Winix]]></title><description><![CDATA[Transform your business. Leverage technology.]]></description><link>https://winix.ro/</link><image><url>https://winix.ro/favicon.png</url><title>Winix</title><link>https://winix.ro/</link></image><generator>Ghost 4.48</generator><lastBuildDate>Wed, 22 Apr 2026 12:12:30 GMT</lastBuildDate><atom:link href="https://winix.ro/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Digital Transformation]]></title><description><![CDATA[Digital transformation is the integration of digital technology into all areas of a business, fundamentally changing how you operate and deliver value to customers.]]></description><link>https://winix.ro/digital-transformation/</link><guid isPermaLink="false">5df0d2de1a391a331fdf6f62</guid><category><![CDATA[Services]]></category><dc:creator><![CDATA[Dragos]]></dc:creator><pubDate>Mon, 09 Dec 2019 16:06:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1560790189-429f6daad014?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1560790189-429f6daad014?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" alt="Digital Transformation"><p>It is also a cultural change that requires organizations to continually challenge the status quo, experiment, and get comfortable with failure.</p><p>This sometimes means walking away from long-standing business processes that companies were built upon in favor of relatively new practices that are still being defined.</p><h2 id="why-does-digital-transformation-matter"><strong><strong><strong><strong>Why does digital transformation matter?</strong></strong></strong></strong></h2><p>Businesses don&apos;t transform by choice because it is expensive and risky. Businesses go through transformation when they have failed to evolve. Companies that want to succeed must understand how to merge technology with strategy.</p><p>No company in the world, no matter its size, will be able to sidestep digitalization. If you want to remain competitive, digitalization is not a question, it is a must. But the road to the Digital Enterprise is not always easy. It&#x2019;s important to find the right strategies for a successful digital transformation.</p><h2 id="the-digital-revolution-s-potential">The digital revolution&#x2019;s potential</h2><p>Digitalization is a central topic at every company, and the necessary technologies are now available. However, here are the questions you must ask yourselves: Where do you start your digital transformation journey? At which costs? What do you already have? What do you need? How can you distinguish the disrupting technologies from the nice-to-have for my business?</p><p>We&#x2019;ll work with you to develop the right digitalization strategy to ensure that your company will be able to focus on what&#x2019;s important, namely business activities and competitiveness. As part of this process, it&#x2019;s important to understand the challenges companies face today. Only then can the right technologies be selected for your specific needs, your installed base, and your particular challenges.</p><h2 id="step-by-step-digital-transformation">Step-by-step digital transformation</h2><ol><li><strong>Scoping workshop</strong>. What are your digitalization goals? In this workshop, we work with all relevant stakeholders to define the results that need to be achieved: Why are you pursuing digitalization? What are your business drivers and motivations behind your digital transformation journey?</li><li><strong>Maturity assessment</strong>. In this step, we examine the IT and Business processes and their level of automation. You receive information about the digital maturity of your business across the entire value chain.</li><li><strong>A digitalization strategy for your enterprise</strong>. After the maturity assessment, we define your tailor-made digital roadmap: a step-by-step approach over short, medium and long term, personalized to your IT and automation landscape and supported by financial analysis and benefits.</li><li><strong>Digital transformation</strong>. The Implementation of the digitalization strategy, including roadmap, program management, change management, and KPI tracking system. The identified financial KPIs, including capital value and return on investment, offer you the confidence that you&#x2019;ll be able to maximize your benefits in the minimum time.</li></ol><h2 id="your-right-partner-for-digital-tranformation">Your right partner for Digital Tranformation</h2><p>We strive to help our customers digitally transform their businesses to drive new sources of revenue, create new and engaging ways to serve their customers, and to transform the way in which their business runs to drive new levels of profitability for their organization.</p><!--kg-card-begin: html--><a class="typeform-share button" href="https://winix.typeform.com/to/xoCyAd" data-mode="popup" style="display:inline-block;text-decoration:none;background-color:#267DDD;color:white;cursor:pointer;font-family:Helvetica,Arial,sans-serif;font-size:20px;line-height:50px;text-align:center;margin:0;height:50px;padding:0px 33px;border-radius:25px;max-width:100%;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;font-weight:bold;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;" data-hide-headers="true" data-hide-footer="true" data-submit-close-delay="3" target="_blank">Contact us </a> <script> (function() { var qs,js,q,s,d=document, gi=d.getElementById, ce=d.createElement, gt=d.getElementsByTagName, id="typef_orm_share", b="https://embed.typeform.com/"; if(!gi.call(d,id)){ js=ce.call(d,"script"); js.id=id; js.src=b+"embed.js"; q=gt.call(d,"script")[0]; q.parentNode.insertBefore(js,q) } })() </script><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Virtual CISO]]></title><description><![CDATA[Ensuring the security of confidential business data including your customer’s sensitive personal and financial details requires constant attention.]]></description><link>https://winix.ro/virtual-ciso/</link><guid isPermaLink="false">5df0d2de1a391a331fdf6f6b</guid><category><![CDATA[Services]]></category><dc:creator><![CDATA[Dragos]]></dc:creator><pubDate>Wed, 13 Nov 2019 20:08:06 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1510511459019-5dda7724fd87?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1510511459019-5dda7724fd87?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" alt="Virtual CISO"><p>We can protect your organization at the same level you would expect from a full-time chief information security officer through our Virtual CISO service without the steep investment of executive compensation and their associated benefits package. Work in collaboration with an advanced vCISO professional able to maintain a relationship with your team and become familiar with both your environment and industry so you stay on top of constantly evolving threats and regulations.</p><h2 id="why-does-information-security-cybersecurity-matter"><strong><strong><strong><strong><strong><strong><strong><strong>Why does </strong></strong></strong></strong>information security/cybersecurity<strong><strong><strong><strong> matter?</strong></strong></strong></strong></strong></strong></strong></strong></h2><p>The threat of cybercrime to businesses is rising fast. The introduction of regulations such as the GDPR means that organizations need to take security more seriously than ever, or face heavy fines. The rising cost of breaches, increasingly sophisticated hackers, a proliferation of IoT devices and tighter regulations means investing in cyber security is a decision to make now.</p><h2 id="the-cybersecurity-benefits">The cybersecurity benefits</h2><ul><li><strong>Trust</strong>. Having a strong cybersecurity program offers confidence to customers that your business is a responsible partner. Stakeholders also trust that their investment is properly safeguarded.</li><li><strong>Reputation</strong>. Implementing the right cybersecurity strategy reduces risk of data theft and bad publicity, thus sustaining the business growth.</li><li><strong>Compliance</strong>. Following privacy regulations and safeguarding partners data is key to reducing risks and associated penalties or lawsuit costs.</li></ul><h2 id="the-benefits-of-outsourcing-ciso">The benefits of outsourcing CISO</h2><ul><li><strong>Cost effective</strong>. Hiring a full time CISO is not an easy task, especially if you require a high level of expertise. High demand for these professionals means that finding a suitable expert for the role might take long time and will require a significant budget.</li><li><strong>High expertise</strong>. vCISO are experts with diverse experience that usually full-time employees lack. Cybersecurity is a restless landscape and only professionals with diverse experience can offer high quality services.</li></ul><h2 id="step-by-step-vciso">Step-by-step vCISO</h2><ol><li><strong>Scoping workshop.</strong> What are your cybersecurity goals? In this workshop, we work with all relevant stakeholders to define the results that need to be achieved: Why are you pursuing cybersecurity? What are your business drivers and motivations?</li><li><strong>Cybersecurity posture<strong> assessment</strong></strong>. In this step, we examine the IT and Security policies and processes. You receive information about the cybersecurity maturity of your business across the entire organization.</li><li><strong><strong>A </strong>cybersecurity<strong> strategy for your enterprise</strong></strong>. After the maturity assessment, we define your tailor-made cybersecurity roadmap: a step-by-step approach over short, medium and long term, personalized to your IT and Security landscape and risk appetite, and supported by financial analysis and benefits.</li><li><strong>Cybersecurity transformation</strong>. The Implementation of the cybersecurity strategy, including roadmap, program management, change management, and KPI tracking system.</li></ol><h2 id="your-right-partner-for-cybersecurity-transformation">Your right partner for Cybersecurity transformation</h2><p>We strive to help our customers protect their businesses in an ever-changing cybersecurity landscape.</p><!--kg-card-begin: html--><a class="typeform-share button" href="https://winix.typeform.com/to/xoCyAd" data-mode="popup" style="display:inline-block;text-decoration:none;background-color:#267DDD;color:white;cursor:pointer;font-family:Helvetica,Arial,sans-serif;font-size:20px;line-height:50px;text-align:center;margin:0;height:50px;padding:0px 33px;border-radius:25px;max-width:100%;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;font-weight:bold;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;" data-hide-headers="true" data-hide-footer="true" data-submit-close-delay="3" target="_blank">Contact us </a> <script> (function() { var qs,js,q,s,d=document, gi=d.getElementById, ce=d.createElement, gt=d.getElementsByTagName, id="typef_orm_share", b="https://embed.typeform.com/"; if(!gi.call(d,id)){ js=ce.call(d,"script"); js.id=id; js.src=b+"embed.js"; q=gt.call(d,"script")[0]; q.parentNode.insertBefore(js,q) } })() </script><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Software Outsourcing Services]]></title><description><![CDATA[Software development outsourcing involves working with a third-party team who has specialist skills and expertise. ]]></description><link>https://winix.ro/software-development-solutions/</link><guid isPermaLink="false">5df0d2de1a391a331fdf6f65</guid><category><![CDATA[Services]]></category><dc:creator><![CDATA[Dragos]]></dc:creator><pubDate>Tue, 12 Nov 2019 20:43:15 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1549692520-acc6669e2f0c?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1549692520-acc6669e2f0c?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" alt="Software Outsourcing Services"><p>Software Outsourcing provides companies with access to expert software engineers boasting a range of tech skills from cloud computing to UX design. And they can start working on a project right away.</p><p>This means companies choose to have software developed by a third-party instead of in-house. From<strong><strong> </strong></strong>smart customization of pre-developed platforms to full-cycle custom software development, we are an experienced development partner to deliver reliable and cost-effective custom software solutions.</p><h2 id="benefits-of-software-development-outsourcing">Benefits of Software Development Outsourcing</h2><p>If you&#x2019;re wondering if software outsourcing is the right match for your business needs, take into consideration your project&#x2019;s schedule, study your available internal skills and resources, analyze your budget, and the risks involved with your line of work. Our outsourcing development services can help you achieve market-fit products in no time with top-notch results.</p><p>One of the key benefits of Software Development Outsourcing is working with the top talented software engineers in the industry. Other important benefits are project&#x2019;s productivity, performance and security, flexible team, reduced risk and cost control.</p><h2 id="most-effective-service-offering">Most effective service offering</h2><ol><li><strong>Staff augmentation</strong>. Expert software engineers work together with your internal team on your projects. These developers join your existing staff until project completion.</li><li><strong>Dedicated team. </strong>Presents talent which directly oversees the whole development project. This option provides a management structure with hands-on supervision of the workflow and tasks.</li><li><strong>Project-based model. </strong>We oversee the entire development process: from establishing the specs, to allocating workflow, setting timescales and quality testing.</li></ol><h2 id="your-right-partner-for-software-outsourcing">Your right partner for Software Outsourcing</h2><p>We strive to help our customers transform dreams to reality in order to reach new markets or better serve their partners.</p><!--kg-card-begin: html--><a class="typeform-share button" href="https://winix.typeform.com/to/xoCyAd" data-mode="popup" style="display:inline-block;text-decoration:none;background-color:#267DDD;color:white;cursor:pointer;font-family:Helvetica,Arial,sans-serif;font-size:20px;line-height:50px;text-align:center;margin:0;height:50px;padding:0px 33px;border-radius:25px;max-width:100%;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;font-weight:bold;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;" data-hide-headers="true" data-hide-footer="true" data-submit-close-delay="3" target="_blank">Contact us </a> <script> (function() { var qs,js,q,s,d=document, gi=d.getElementById, ce=d.createElement, gt=d.getElementsByTagName, id="typef_orm_share", b="https://embed.typeform.com/"; if(!gi.call(d,id)){ js=ce.call(d,"script"); js.id=id; js.src=b+"embed.js"; q=gt.call(d,"script")[0]; q.parentNode.insertBefore(js,q) } })() </script><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Cloud Migration]]></title><description><![CDATA[Cloud computing has revolutionized IT since the 2000’s, and this revolution is far from over.]]></description><link>https://winix.ro/cloud-migration/</link><guid isPermaLink="false">5df0d2de1a391a331fdf6f64</guid><category><![CDATA[Services]]></category><dc:creator><![CDATA[Dragos]]></dc:creator><pubDate>Tue, 12 Nov 2019 20:12:27 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1565273601018-d1da7cfed4f7?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1565273601018-d1da7cfed4f7?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" alt="Cloud Migration"><p>Formerly, organizations would host their data on-premise as that was the only option available, but with the advancement in technology, and fast-changing business demands, cloud-based solutions started turning out to be a more flexible and powerful option for organizations. There is a mass migration underway to adopt cloud infrastructure and avoid the hassles and operational costs of managing infrastructure in-house. Migration to the cloud is a long, phased-out journey rather than a one-time &#x2018;set it and forget it&#x2019; task.</p><p>It&#x2019;s reasonable to say that less savvy organizations and more entrenched ones will take even longer. In fact, a complete migration may not even be a possibility for many organizations, and most will likely end up with hybrid cloud setups.</p><h2 id="business-benefits-of-cloud-migration">Business benefits of Cloud Migration</h2><p>By shifting workloads to Cloud, organizations are able to perform faster, reach global markets, reduce operations and security risks, reduce capital investments and staffing.</p><p>Cloud computing or SaaS provides other several advantages to enterprises including cost effectiveness, quick and easy setup, improved operational efficiency, business continuity and reduced IT complexity. </p><h2 id="step-by-step-cloud-migration">Step-by-step Cloud Migration</h2><ol><li><strong>Scoping workshop</strong>. What are your cloud migration goals? In this workshop, we work with all relevant stakeholders to define the results that need to be achieved: Why are you pursuing cloud migration? What are your business drivers and motivations behind your cloud journey?</li><li><strong><strong>Maturity assessment</strong>. </strong>In this step, we examine the IT infrastructure and services. You receive information about the IT maturity and services landscape.</li><li><strong><strong>A </strong>cloud migration<strong> strategy for your enterprise</strong>. </strong>After the maturity assessment, we define your tailor-made cloud migration roadmap: a step-by-step approach over short, medium and long term, personalized to your IT environment and supported by financial analysis and benefits.</li><li><strong>Cloud Migration.</strong> The Implementation of the strategy, including roadmap, program management, change management, and KPI tracking system. The identified financial KPIs, including capital value and return on investment, offer you the confidence that you&#x2019;ll be able to maximize your benefits in the minimum time.</li></ol><h2 id="your-right-partner-for-cloud-migration">Your right partner for Cloud Migration</h2><p>We strive to help our customers transform their infrastructure to drive new levels of agility, flexibility and availability in order to better serve their customers and partners.</p><!--kg-card-begin: html--><a class="typeform-share button" href="https://winix.typeform.com/to/xoCyAd" data-mode="popup" style="display:inline-block;text-decoration:none;background-color:#267DDD;color:white;cursor:pointer;font-family:Helvetica,Arial,sans-serif;font-size:20px;line-height:50px;text-align:center;margin:0;height:50px;padding:0px 33px;border-radius:25px;max-width:100%;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;font-weight:bold;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;" data-hide-headers="true" data-hide-footer="true" data-submit-close-delay="3" target="_blank">Contact us </a> <script> (function() { var qs,js,q,s,d=document, gi=d.getElementById, ce=d.createElement, gt=d.getElementsByTagName, id="typef_orm_share", b="https://embed.typeform.com/"; if(!gi.call(d,id)){ js=ce.call(d,"script"); js.id=id; js.src=b+"embed.js"; q=gt.call(d,"script")[0]; q.parentNode.insertBefore(js,q) } })() </script><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[DevSecOps Enablement]]></title><description><![CDATA[Through continuous monitoring, assessment and analysis, DevSecOps ensures that any loopholes and weaknesses are identified early in the development process and remediated immediately.]]></description><link>https://winix.ro/devsecops/</link><guid isPermaLink="false">5df0d2de1a391a331fdf6f63</guid><category><![CDATA[Services]]></category><dc:creator><![CDATA[Dragos]]></dc:creator><pubDate>Tue, 12 Nov 2019 16:32:45 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1519389950473-47ba0277781c?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1519389950473-47ba0277781c?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=2000&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ" alt="DevSecOps Enablement"><p>Alignment of development and operations teams through DevOps has made it possible to build customized software and business applications in far quicker time. However, in most cases security has not been accorded a high priority in DevOps implementation and is often viewed as a roadblock to rapid development.</p><p>Though organizations are increasingly focused on breaking down the traditional silos between the development, testing and operations teams, many of them haven&#x2019;t been integrating security into their development process, becoming susceptible to the risk of threats and vulnerabilities.</p><p>Here is where DevSecOps comes in. The DevSecOps approach includes incorporating security as a major component of the DevOps practices.</p><h2 id="business-benefits-of-devsecops">Business Benefits of DevSecOps</h2><p>By shifting to a DevSecOps approach, organizations are able to transform their handling of the development pipeline. Increased collaboration between the development, security and operations teams ensures that vulnerabilities are identified and security threats are minimized in the early stages itself.</p><p>DevSecOps provides several other advantages to enterprises including greater agility and speed for the security teams, enhanced communication and collaboration between the teams, and early identification of code vulnerabilities. DevSecOps also enables organizations with an ability to rapidly respond to change, in addition to providing opportunities for quality assurance testing and automated builds.</p><p><strong><strong>A number of additional benefits also result from the adoption of DevSecOps, which include:</strong></strong></p><ul><li><strong><strong>Automatic Securing of Code</strong></strong> &#x2013; DevSecOps reduces the risk of introducing security flaws through human error by automating tests and enables greater coverage, consistency and predictable processes. Additionally, any issues can be tracked and fixed as soon as they occur during the development process.</li><li><strong><strong>Continuous Security Enablement</strong></strong> &#x2013; By using automation tools, organizations are able to create a closed-loop process for testing and reporting, thereby ensuring that all security concerns are immediately resolved.</li><li><strong><strong>Leveraging Security Resources</strong></strong> &#x2013; DevOps automates most of the standard security processes and tasks that require lesser hands-on time such as event monitoring, account management, code security and vulnerability assessments. This allows security professionals to focus their attention towards threat remediation and elimination of strategic risk.</li></ul><h2 id="adopting-a-devsecops-strategy">Adopting a DevSecOps Strategy</h2><ol><li><strong>Scoping workshop</strong>. What are your DevOps and Security goals? In this workshop, we work with all relevant stakeholders to define the results that need to be achieved: Why are you pursuing DevSecOps? What are your business drivers and motivations behind this journey?</li><li><strong>Maturity assessment</strong>. In this step, we examine the IT and Software Engineering (DevOps) and Security workflows and their level of integration and automation. You receive information about the DevSecOps maturity of your business across the entire CI/CD chain.</li><li><strong>A DevSecOps strategy</strong>. After the maturity assessment, we define your tailor-made DevSecOps roadmap: a step-by-step approach over short, medium and long term, personalized to your processes and automation landscape and supported by financial analysis and benefits.</li><li><strong>DevSecOps enablement</strong>. The Implementation of the strategy, including roadmap, program management, change management, and KPI tracking system. The identified financial KPIs, including capital value and return on investment, offer you the confidence that you&#x2019;ll be able to maximize your benefits in the minimum time.</li></ol><h2 id="your-right-partner-for-devsecops-enablement">Your right partner for DevSecOps Enablement</h2><p>We strive to help our customers transform their processes to drive new levels of security and availability in order to better serve their customers and protect critical assets.</p><!--kg-card-begin: html--><a class="typeform-share button" href="https://winix.typeform.com/to/xoCyAd" data-mode="popup" style="display:inline-block;text-decoration:none;background-color:#267DDD;color:white;cursor:pointer;font-family:Helvetica,Arial,sans-serif;font-size:20px;line-height:50px;text-align:center;margin:0;height:50px;padding:0px 33px;border-radius:25px;max-width:100%;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;font-weight:bold;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;" data-hide-headers="true" data-hide-footer="true" data-submit-close-delay="3" target="_blank">Contact us </a> <script> (function() { var qs,js,q,s,d=document, gi=d.getElementById, ce=d.createElement, gt=d.getElementsByTagName, id="typef_orm_share", b="https://embed.typeform.com/"; if(!gi.call(d,id)){ js=ce.call(d,"script"); js.id=id; js.src=b+"embed.js"; q=gt.call(d,"script")[0]; q.parentNode.insertBefore(js,q) } })() </script><!--kg-card-end: html-->]]></content:encoded></item></channel></rss>