Key features of our company
History of Marvel Hawk
The average time users spend on their smartphones per day, is 5 hours. 2 out of 3 minutes online are spent on a mobile device.
There is no passion to be found playing small--in settling for a life that is less than the one you are capable of living.
When visiting a website, users decide in 10 seconds or less whether they trust your company, based on the design of your website.
There is only one boss. The customer―and they can fire everybody in the company from the chairman on down, simply by spending their money somewhere else.
Almost half of all users say website design is the number one factor that shapes their opinion on the credibility of the business
38% of people will stop visiting a website if its design is sloppy and unattractive.
The ones who runs this company
What we've done for people
Software substitution, whether it's for drivers or waiters or nurses - it's progressing.
Technology over time will reduce demand for jobs, particularly at the lower end of skill set.
Choose a pricing plan that fits your needs.
Lets get in touch. Send us a message:
Phone: +971 441-4184
Thanks for your interest. We will with you in the next couple business days.
24 years on the global market. I've worked since 1996. After a two decades of working with clients, internationals and projects all shapes and scopes, you can expect to have a finely tuned specification developed by experience with the flexibility for the changes in your business as well as keep everyone apprised of the details.
In 1996 started HTML coding in High School. Google was not even a name, let alone a browser, an operating system, a web application platform. Very few features in the early web, Java applets and flash were the cutting-edge technology of the day. This was the website that started it all under my own name. In 1998 I was asked if I was interested in working for the Oregon Public Education Network innovating a piece of technology that would showcase what the internet could do for education. I gladly accepted the invitation.
Mathman was that innovation. This tiny image is all I can find of that website called MathMan. A tutorial website on Mathematics and also a few strategy games built as of course Java Applets! This particular website earned me a scholarship out of high school and my Computer Science destiny was set.
While attending college in 2000 I took on a volunteer work as I didn't have time to fully devote to another company, even working for LSI Logic as a 40+hours a week, going to college full time, I managed to learn flash and design and develop intros for ForUsNorthwest.org who helps children with AIDs. Help Life line Peer Support build a CRM and phone call in database, and take care of a local dog shelter's web presence.
Even with the work load in 2002 I managed to graduate with a degree and honors.
After doing my studies I went into yield data systems engineering for LSI Logic during which I was awarded a company high honor Bravo award and earned the company two patents for software I built;ARPS which is Automated for Reporting Passdown Systems and a process I developed for pad conditioning for APEC Chemical-Mechanical Planerizers.
Starting in 2007, I developed a tutorial website and blog under the name Hawk Enterprises. I continued to create websites for clients as well as build my own network of websites. Despite working in the cutting edge of industry for LSI Logic, folks of the older generation were still calling the internet a 'fad'. Certainly hilarious today, but the juxtaposition during that era made talking to anyone outside the industry difficult at best. Thankfully business minded folks saw the future of innovation. this is where I got to add the big names of Nike, Intel, and Hewlett Packard to my list of clients.
2011, After a decade of work consolidation under a different name with a small footprint was ideal. Hence GRX3 was started. Working my client base and building on more on the development side rather than focusing on design. Game development, building and marketing actual web applications and still blogging and building out the network of sites. This is also when we branched out globally approaching clients through what now are readily available freelance/gig type sites. I now had access to clients in countries that years ago couldn't of even thought of reaching. Building realty shops for Bulgarians, Process Ecommerce for Indonesians, Design shops in Israel. Truly made the world closer to my fingertips and felt more connected.
2012, The world was suppose to end, or so said the Mayan Calendar. We instead double downed on the internet, banking over 100 domains that year. Domain harvesting was in, building micro-sites were the thing, and trying to turn money via ad revenue through Google and Yahoo. I as many developers had, turned to auto-content, quick install Adsense ready Wordpress sites attempting to capture keyword niches and mine untapped ad revenue. Lots of writing of data scrapers to mine premium content and insert/stuff keywords and random content into pages to hopefully get search engines to recognize it as original and thus an authority on the subject. Certainly the more gray hat side of Marvel Hawk.
2014, After two decades of design, developing, and marketing, it was time to take a break. GRX3 became the brand for a Minecraft network. Devoting all my resources, effort, and abilities in just a few short months we went from a tiny little server to #1 Minecraft Network in many categories. Lots of games, custom modifications, servers, staff, and data.
Shortly after 2015 GRX3 Minecraft Network went away, and I took a break entirely from anything technological. During this time practiced my traditional art skills, took long walks, and just did my best to live free of computers, phones, and anything doing with technology.
After two years, unplugged, it was time to get back to what I did best. In 2017 MarvelHawk is started. Entirely unknown about it's Marvel Comic book competitor, we soon gained rank against Hawk eye. Marvel Hawk is and was going to be our web design and development business front end. It was long until we had clients again.
2018 Marvel Hawk is under way, it's time to bring back up my side hobby and that is Minecraft. Marvel Hawk lends itself once again to GRX3 under the Minecraft title and work begins on bring that back. Developing PHP based daemons that work for all of Mojang's Minecraft and delivering to the community another way to manage their servers.
2019 Started working with ComScore as a Data Associate. Shortly after was internally promoted to other duties under the same title, and in under a year was promoted to Lead of International. As Lead of International I also started to develop software to track phone calls, error tracking and analysis, data reporting, as well as document control.
2020 Still working with ComScore, MarvelHawk takes on other clients as well. Developing eCommerce, Wordpress, and many other pre-packaged software designs and templates. Focusing on the majority of custom development for comScore, and the open source community via GitHub with Minecraft projects.
The company must restrict access to confidential and sensitive data to protect it from being lost or compromised in order to avoid adversely impacting our customers, incurring penalties for non-compliance and suffering damage to our reputation. At the same time, we must ensure users can access data as required for them to work effectively.
It is not anticipated that this policy can eliminate all malicious data theft. Rather, its primary objective is to increase user awareness and avoid accidental loss scenarios, so it outlines the requirements for data breach prevention.
This data security policy applies all customer data, personal data, or other company data defined as sensitive by the company’s data classification policy. Therefore, it applies to every server, database and IT system that handles such data, including any device that is regularly used for email, web access or other work-related tasks. Every user who interacts with company IT services is also subject to this policy.
Information that is classified as Public is not subject to this policy. Other data can be excluded from the policy by company management based on specific business needs, such as that protecting the data is too costly or too complex.
The company shall provide all employees and contracted third parties with access to the information they need to carry out their responsibilities as effectively and efficiently as possible.
Access to company IT resources and services will be given through the provision of a unique user account and complex password. Accounts are provided by the IT department based on records in the HR department.
Passwords are managed by the IT Service Desk. Requirements for password length, complexity and expiration are stated in the company password policy.
Role-based access control (RBAC) will be used to secure access to all file-based resources in Active Directory domains.
Access control methods to be used shall include: Auditing of attempts to log on to any device on the company network Windows NTFS permissions to files and folders Role-based access model Server access rights Firewall permissions Network zone and VLAN ACLs Web authentication rights Database access rights and ACLs Encryption at rest and in flight Network segregation
Access control applies to all networks, servers, workstations, laptops, mobile devices, web applications and websites, cloud storages, and services.
Data owners are employees who have primary responsibility for maintaining information that they own, such as an executive, department manager or team leader. Information Security Administrator is an employee designated by the IT management who provides administrative support for the implementation, oversight and coordination of security procedures and systems with respect to specific information resources. Users include everyone who has access to information resources, such as employees, trustees, contractors, consultants, temporary employees and volunteers. The Incident Response Team shall be chaired by an executive and include employees from departments such as IT Infrastructure, IT Application Security, Legal, Financial Services and Human Resources.
Any user found in violation of this policy is subject to disciplinary action, up to and including termination of employment. Any third-party partner or contractor found in violation may have their network connection terminated.
Access control list (ACL) — A list of access control entries (ACEs) or rules. Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied or audited for that trustee. Database — An organized collection of data, generally stored and accessed electronically from a computer system. Encryption—The process of encoding a message or other information so that only authorized parties can access it. Firewall — A technology used for isolating one network from another. Firewalls can be standalone systems or can be included in other devices, such as routers or servers. Network segregation — The separation of the network into logical or functional units called zones. For example, you might have a zone for sales, a zone for technical support and another zone for research, each of which has different technical needs. Role-based access control (RBAC) — A policy-neutral access-control mechanism defined around roles and privileges. Server — A computer program or a device that provides functionality for other programs or devices, called clients. Virtual private network (VPN) — A secure private network connection across a public network. VLAN (virtual LAN) — A logical grouping of devices in the same broadcast domain.
This section lists all documents related to the policy and provides links to them. Data Classification Policy (TBD) Password Policy (TBD) Data Loss Protection Policy (TBD) Encryption Policy (TBD) Incident Response Policy (TBD) Workstation Security Policy (TBD) Data Processing Agreement (TBD)
Version Date of Revision Author Description of Changes 1.0 June 12, 2020 M.Hawk, Owner Initial Version
Wherever your Personal Information may be held within our company or on its behalf, we intend to take reasonable and appropriate steps to protect the Personal Information that you share with us from unauthorized access or disclosure.
To the extent that you do provide us with Personal Information, we wish to maintain accurate Personal Information. Where we collect Personal Information from you on the Web, our goal is to provide a means of contacting us should you need to update or correct that Information. If for any reason those means are unavailable or inaccessible, you may send updates and corrections about your Personal Information to us and we will make reasonable efforts to incorporate the changes in your Personal Information that we hold as soon as practicable.
Because we respect privacy rights, we allow you to opt out of receiving certain information. If we choose to send news, bulletins or other marketing information or communications to you, we will provide you with the ability to decline, or opt out of, receiving such communications, and we will take reasonable steps to comply with such requests in a timely manner. Instructions for opting out will be provided if and when we determine to send such a communication. Please understand that you will not be allowed to opt out of formal notices concerning the operation of our Website, and legal and other related notices concerning your relationship to us and the products you have purchased/downloaded.
Third parties provide certain services available on this web site. We may provide information, including Personal Information that we collect on the Web to third-party service providers to help us deliver programs, products, information, and services. Service providers are also an important means by which we maintain our Web site and mailing lists. We will take reasonable steps to ensure that these third-party service providers are obligated to protect Personal Information on our behalf. We do not intend to transfer Personal Information without your consent to third parties who are not bound to act on our behalf unless such transfer is legally required. Similarly, it is against our policy to sell Personal Information collected online without consent.
We may transfer some parts of the collected information to our partners and affiliates. Partners play an important role in our operations: they help us market, sell and support our products and services. We take applicable steps to ensure that our partners and affiliates are required to protect your Personal Information on our behalf.
We are not structured to attract children. Accordingly, we do not intend to collect Personal Information from anyone we know to be under 13 years of age.
This web site may contain links to other web sites and you should review the privacy policies on those sites. We have no responsibility for the policies and practices of those sites.