He is a great communicator, has brilliant ideas, and top-notch graphic design skills. He also has integrity and super responsive. I would work with him again in a heartbeat.
Amri was terrific - she followed through on all my questions and changes
We are so pleased with the design Nimas created -- she had the design idea that stood out from the rest right from the start, as being right on point with the abstract concept we were trying to convey, from the shape to the color selection. In turn, her design set the stage for the other designers - they had a standard to try to beat. She was also really responsive to suggestions and requests to see it with minor tweaks, which we so appreciated. We're really looking forward to using our new logo! Thank you, Nimas!
- Dey Mash
Great style and taste. Took direction very well and delivered a design that was right on. Super easy to work with!
How gregUD started their logo design journey
Who are you known as?
What’s your company slogan?
Our Secret Sauce Keeps Your Sauce Secret
Tell us a bit about who you are and the people you reach
Our product allows entities (companies/people) to share their most private data and algorithms privately and securely. We have "next generation" cryptography which keeps this exchange/sharing/collaboration safe, thus allowing parties to work together to create value, do commerce and build community. Our immediate audience is companies with large amounts of sensitive data that, if shared would create value - but can't be shared today because of sensitivities (banks, health care institutions, fitness trackers (fitbit), entertainment companies (Apple, Netflix, etc.), etc.). Our true "secret sauce" is that we can encrypt algorithms as well as data (most encryption is only applied to data today).
What industry do you think your business is most related to?
What colors do you want to see in your design?
To give us an idea of the overall feeling of your brand, let us know which styles you lean towards
the name "TripleBlind" alludes to the fact that due to our encryption we are "blind" to 1) the data, 2) the algorithm and 3) the interaction of the two. All of that is private to the entities collaborating. Finally - please - no riffs on "Three Blind Mice"!