{"id":1295,"date":"2019-03-25T06:18:43","date_gmt":"2019-03-25T06:18:43","guid":{"rendered":"https:\/\/www.acacia.co.th\/?page_id=1295"},"modified":"2019-03-25T06:18:43","modified_gmt":"2019-03-25T06:18:43","slug":"case-studies-02","status":"publish","type":"page","link":"https:\/\/www.acacia.co.th\/th\/case-studies-02\/","title":{"rendered":"Case Studies 02"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div id=\"tm-row-69e1bb8bb859b\" data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row vc_row-outer vc_row-fluid\"><div id=\"tm-column-69e1bb8bb90cf\" class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner \"><div class=\"wpb_wrapper\"><div class=\"tm-spacer\" id=\"tm-spacer-69e1bb8bb96a3\"><\/div>\n\n<div class=\"tm-heading  center tm-animation move-up\" id=\"tm-heading-69e1bb8bb9b8d\">\n\t<h3 class=\"heading\" style=\"\">Our projects <mark>make us proud<\/mark><\/h3><\/div>\n\n<div class=\"tm-spacer\" id=\"tm-spacer-69e1bb8bba3ab\"><\/div>\n\t<div class=\"tm-grid-wrapper tm-case-study style-grid filter-style-01 has-caption caption-style-01 tm-animation move-up\"\n\t     id=\"tm-case-study-69e1bb8bba960\"\n\n\t\t\n\t\t\n\t\t data-filter-type=\"static\"\n\n\t\t\n\t\t\n\t\t\n\t\t\t\t\tdata-gutter=\"30\"\n\t\t\n\t\t\t>\n\t\t\n\t\t\n\t\t<div class=\"tm-filter-button-group center show-filter-counter\"\n\t\t\tdata-filter-counter=\"true\"\t\t>\n\t\t\t\n\t\t\t\t\t\t<div class=\"tm-filter-button-group-inner\">\n\t\t\t\t\t\t\t<a href=\"javascript:void(0);\" class=\"btn-filter current\"\n\t\t\t\t\t\t\t   data-filter=\"*\" data-filter-count=\"6\">\n\t\t\t\t\t\t\t\t<span class=\"filter-text\">All<\/span>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<a href=\"javascript:void(0);\" class=\"btn-filter\" data-filter=\".case_study_category-cloud-services\" data-ajax-filter=\"case_study_category:cloud-services\" data-filter-count=\"1\"><span class=\"filter-text\">Cloud Services<\/span><\/a><a href=\"javascript:void(0);\" class=\"btn-filter\" data-filter=\".case_study_category-cyber-security\" data-ajax-filter=\"case_study_category:cyber-security\" data-filter-count=\"3\"><span class=\"filter-text\">Cyber Security<\/span><\/a><a href=\"javascript:void(0);\" class=\"btn-filter\" data-filter=\".case_study_category-it-consultancy\" data-ajax-filter=\"case_study_category:it-consultancy\" data-filter-count=\"1\"><span class=\"filter-text\">IT consultancy<\/span><\/a><a href=\"javascript:void(0);\" class=\"btn-filter\" data-filter=\".case_study_category-it-security\" data-ajax-filter=\"case_study_category:it-security\" data-filter-count=\"1\"><span class=\"filter-text\">IT Security<\/span><\/a>\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\n\t\t<\/div>\n\t\t\n\t\t<input type=\"hidden\" class=\"tm-grid-query\" value=\"{&quot;post_type&quot;:&quot;case_study&quot;,&quot;posts_per_page&quot;:&quot;9&quot;,&quot;orderby&quot;:&quot;date&quot;,&quot;order&quot;:&quot;DESC&quot;,&quot;paged&quot;:1,&quot;post_status&quot;:&quot;publish&quot;,&quot;tax_query&quot;:{&quot;0&quot;:{&quot;taxonomy&quot;:&quot;case_study_tags&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;basic&quot;]},&quot;relation&quot;:&quot;AND&quot;},&quot;action&quot;:&quot;case_study_infinite_load&quot;,&quot;max_num_pages&quot;:1,&quot;found_posts&quot;:6,&quot;taxonomies&quot;:&quot;case_study_tags:basic&quot;,&quot;style&quot;:&quot;grid&quot;,&quot;image_size&quot;:&quot;480x298&quot;,&quot;overlay_style&quot;:&quot;&quot;,&quot;caption_style&quot;:&quot;01&quot;,&quot;enable_popup_video&quot;:&quot;&quot;,&quot;metro_layout&quot;:&quot;%5B%7B%22size%22%3A%221%3A1%22%7D%2C%7B%22size%22%3A%222%3A2%22%7D%2C%7B%22size%22%3A%221%3A2%22%7D%2C%7B%22size%22%3A%221%3A1%22%7D%2C%7B%22size%22%3A%221%3A1%22%7D%2C%7B%22size%22%3A%222%3A1%22%7D%2C%7B%22size%22%3A%221%3A1%22%7D%5D&quot;,&quot;pagination&quot;:&quot;pagination&quot;,&quot;count&quot;:6}\"\/>\n\n\t\t\n\t\t\t\t\t<div class=\"tm-grid has-animation move-up modern-grid\"\n\t\t\t\t\t     data-overlay-animation=\"\"\n\n\t\t\t\t\t\t\t\t\t\t\t>\n\n\t\t\t\t\t\t\t<div class=\"case-study-item grid-item post-734 case_study type-case_study status-publish has-post-thumbnail hentry case_study_category-cyber-security case_study_tags-basic\">\n\t\t<div class=\"post-wrapper\">\n\t\t\t<div class=\"post-thumbnail-wrapper\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/aeroland-smart-vision\/\" class=\"post-permalink link-secret video-link\">\n\t\t\t\t\t<div class=\"post-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\"  loading=\"lazy\" alt=\"case-study-01\" width=\"480\" height=\"298\" src=\"https:\/\/www.acacia.co.th\/wp-content\/uploads\/2019\/03\/case-study-01-480x298.jpg\" \/>\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"post-info\">\n\t\t\t\t<div class=\"post-categories\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case-study-category\/cyber-security\/\" rel=\"tag\">Cyber Security<\/a>\t\t\t<\/div>\n\t\t\t\n\t<h3 class=\"post-title\">\n\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/aeroland-smart-vision\/\">Aeroland-Smart Vision<\/a>\n\t<\/h3>\n<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"case-study-item grid-item post-738 case_study type-case_study status-publish has-post-thumbnail hentry case_study_category-cyber-security case_study_tags-basic\">\n\t\t<div class=\"post-wrapper\">\n\t\t\t<div class=\"post-thumbnail-wrapper\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/arden-internal-networking\/\" class=\"post-permalink link-secret video-link\">\n\t\t\t\t\t<div class=\"post-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\"  loading=\"lazy\" alt=\"case-study-02\" width=\"480\" height=\"298\" src=\"https:\/\/www.acacia.co.th\/wp-content\/uploads\/2019\/03\/case-study-02-480x298.jpg\" \/>\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"post-info\">\n\t\t\t\t<div class=\"post-categories\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case-study-category\/cyber-security\/\" rel=\"tag\">Cyber Security<\/a>\t\t\t<\/div>\n\t\t\t\n\t<h3 class=\"post-title\">\n\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/arden-internal-networking\/\">Arden-Internal Networking<\/a>\n\t<\/h3>\n<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"case-study-item grid-item post-740 case_study type-case_study status-publish has-post-thumbnail hentry case_study_category-cyber-security case_study_tags-basic\">\n\t\t<div class=\"post-wrapper\">\n\t\t\t<div class=\"post-thumbnail-wrapper\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/a-freeserve-case-study\/\" class=\"post-permalink link-secret video-link\">\n\t\t\t\t\t<div class=\"post-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\"  loading=\"lazy\" alt=\"case-study-03\" width=\"480\" height=\"298\" src=\"https:\/\/www.acacia.co.th\/wp-content\/uploads\/2019\/03\/case-study-03-480x298.jpg\" \/>\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"post-info\">\n\t\t\t\t<div class=\"post-categories\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case-study-category\/cyber-security\/\" rel=\"tag\">Cyber Security<\/a>\t\t\t<\/div>\n\t\t\t\n\t<h3 class=\"post-title\">\n\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/a-freeserve-case-study\/\">A Freeserve case study<\/a>\n\t<\/h3>\n<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"case-study-item grid-item post-1280 case_study type-case_study status-publish has-post-thumbnail hentry case_study_category-cloud-services case_study_tags-basic\">\n\t\t<div class=\"post-wrapper\">\n\t\t\t<div class=\"post-thumbnail-wrapper\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/aqua-research-and-energy\/\" class=\"post-permalink link-secret video-link\">\n\t\t\t\t\t<div class=\"post-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\"  loading=\"lazy\" alt=\"case-study-04\" width=\"480\" height=\"298\" src=\"https:\/\/www.acacia.co.th\/wp-content\/uploads\/2019\/03\/case-study-04-480x298.jpg\" \/>\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"post-info\">\n\t\t\t\t<div class=\"post-categories\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case-study-category\/cloud-services\/\" rel=\"tag\">Cloud Services<\/a>\t\t\t<\/div>\n\t\t\t\n\t<h3 class=\"post-title\">\n\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/aqua-research-and-energy\/\">Aqua &#8211; Research and Energy<\/a>\n\t<\/h3>\n<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"case-study-item grid-item post-1283 case_study type-case_study status-publish has-post-thumbnail hentry case_study_category-it-consultancy case_study_tags-basic\">\n\t\t<div class=\"post-wrapper\">\n\t\t\t<div class=\"post-thumbnail-wrapper\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/a-sixbase-typical-case-study\/\" class=\"post-permalink link-secret video-link\">\n\t\t\t\t\t<div class=\"post-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\"  loading=\"lazy\" alt=\"case-study-05\" width=\"480\" height=\"298\" src=\"https:\/\/www.acacia.co.th\/wp-content\/uploads\/2019\/03\/case-study-05-480x298.jpg\" \/>\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"post-info\">\n\t\t\t\t<div class=\"post-categories\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case-study-category\/it-consultancy\/\" rel=\"tag\">IT consultancy<\/a>\t\t\t<\/div>\n\t\t\t\n\t<h3 class=\"post-title\">\n\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/a-sixbase-typical-case-study\/\">A Sixbase typical case study<\/a>\n\t<\/h3>\n<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"case-study-item grid-item post-1286 case_study type-case_study status-publish has-post-thumbnail hentry case_study_category-it-security case_study_tags-basic\">\n\t\t<div class=\"post-wrapper\">\n\t\t\t<div class=\"post-thumbnail-wrapper\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/healsoul-technology-health\/\" class=\"post-permalink link-secret video-link\">\n\t\t\t\t\t<div class=\"post-thumbnail\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\"  loading=\"lazy\" alt=\"case-study-06\" width=\"480\" height=\"298\" src=\"https:\/\/www.acacia.co.th\/wp-content\/uploads\/2019\/03\/case-study-06-480x298.jpg\" \/>\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"post-info\">\n\t\t\t\t<div class=\"post-categories\">\n\t\t\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case-study-category\/it-security\/\" rel=\"tag\">IT Security<\/a>\t\t\t<\/div>\n\t\t\t\n\t<h3 class=\"post-title\">\n\t\t<a href=\"https:\/\/www.acacia.co.th\/th\/case_study\/healsoul-technology-health\/\">Healsoul &#8211; Technology &#038; Health<\/a>\n\t<\/h3>\n<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\n\t<\/div>\n<div class=\"tm-spacer\" id=\"tm-spacer-69e1bb8bc2bf1\"><\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Using IT techniques to energize sales and marketing Overview The effective application of such technologies has become a key resource central to each organization\u2019s competitive strength. Brian Norma \/ Group General Director - Aqua Group This case study focuses on how Bryant Homes has used information technology. It shows how using both an Intranet and the Internet together with interactive multimedia, places Bryant Homes at the forefront of its sector. Tags basic Share Requirements Our solution The communication between machines of different kinds sometimes cause troubles and inaccurate signal decoding results. Advancements in technology \u2013 including machine-to-machine communications between smart sensors, referred to as \u2018The Internet of Things\u2019. For example, appliances in the home that can be monitored and controlled wirelessly by the homeowner wherever they are. The potential market for servers and networking equipment development is still unstable and shrinks every year. Market development \u2013 increasing market share in new markets such as servers and networking equipment. ARM\u2019s technology is well placed to provide lower power options to transport, distribute, analyse and store data across the internet. Demand for energy efficient technology \u2013 the market demands high performance products using low power technology. This case study will demonstrate how ARM\u2019s strategies contribute to the achievement of its business vision, aims and objectives using an integrated approach focusing on innovation, its people and its network of partners. Results: Modern customers are much more sophisticated and want extensive comparative information and advice. New multiple site connectivity We use a newly developed technology to connect sites that are based on different types of servers and networks, SiteConnect, which helps to reduce the misinterpretation of signals as well as the loss of data during transfering. IT security &amp; software To keep your systems, your devices, and network stay secure, we have developed a new program that limits the access of suspicious objects or people and authenticate all logins to the system. Weak hosted capability Some hosts are unaware of the potential risks as well as security loopholes in their system. By detecting these errors and taking prompt actions on improving firewalls, we can upgrade the system security. Build internal network The internal network is essential for all companies and corporations, especially for those working in IT sector. To avoid possible risks when sharing internal confidential files and documentation to an external receiver, internal network must be strong. Testimonials How our services bring about success MAGGIE STRICKLAND Web design Working with @Mitech is like having a family member who can fix everything. MONICA BLEWS Web design Working with @Mitech is like having a family member who can fix everything. ROBERT AMPLILIAN Web design Working with @Mitech is like having a family member who can fix everything. Robert Amplilian Marketing I discovered @Mitech services by chance on the Internet to find a suitable IT services provider. This must be fate, not an accident at all. Monica Blews Web designer There are thousands of IT service companies in the US. But there&#8217;s nothing like @Mitech. Their popularity and reputation are just evident. Maggie Strickland Web design I&#8217;ve been working with over 35 IT companies on more than 200 projects of our company, but @Mitech is one of the most impressive to me. Stephen Mearsley PR Officer IT service is not an easy path to follow. But these guys can make it to the top with premium services and dedicated customer support.","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1295","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.acacia.co.th\/th\/wp-json\/wp\/v2\/pages\/1295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.acacia.co.th\/th\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.acacia.co.th\/th\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.acacia.co.th\/th\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.acacia.co.th\/th\/wp-json\/wp\/v2\/comments?post=1295"}],"version-history":[{"count":0,"href":"https:\/\/www.acacia.co.th\/th\/wp-json\/wp\/v2\/pages\/1295\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.acacia.co.th\/th\/wp-json\/wp\/v2\/media?parent=1295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}