Discover the importance of AI Governance on WNPL's glossary. Ensure ethical, transparent AI use within your organization
Learn about model deployment strategies, challenges, and best practices for AI systems on WNPL's glossary page. Ensure scalability and reliability.
Explore how Natural Language Processing enhances AI interactions. Learn NLP applications from chatbots to sentiment analysis.
Dive into our Markov Chain glossary page to understand how these models predict future states in stochastic processes
Understand what Data Fabric is. This glossary explains the details and exposes some commonly asked questions.
Explore cloud application development on WNPL's glossary page. Learn how it revolutionizes software creation with scalability and flexibility.
Discover the power of data visualization on WNPL's glossary page. See how it transforms data into actionable insights across different fields and applications.
Understand what Data Lakehouse is. This glossary explains the details and exposes some commonly asked questions.
AI-driven Innovation is reshaping industries. Discover how AI technologies foster new products, services, and business models.
Discover Data Management strategies for modern businesses on WNPL's glossary, covering governance, quality, and technology best practices
Successful AI Implementation starts with a solid Prototype. Discover the journey from initial concept to full-scale deployment.
This is a method to compare two versions of an app or website or page (or any other resource) against each other to determine which one performs better. A/B testing is also known as split testing or bucket testing.
A/B testing is done extensively in marketing, where you might split the audience into two (or more) groups to run different variations of the same campaign. Similarly, A/B testing can be used to find the best way to organise screen elements when building a new software product.
For example, in Google Ads marketing, you might show one version of the ad to, say, half the audience and another version to another half. This allows to pick the best performing ad. This can be done on more variations, until you find the best performing ad. The same approach could be used for optimising landing pages for best performance.
Ad Hoc distribution of iOS apps allows an app to be distributed to a finite list of known iOS devices. The app is not published in app store, instead, the installation files are provided outside of the app store directly to such devices.
Ad Hoc version of the app is usually made before it is published to app store. This approach allows the app to be tested on a known set of devices. This is also used as a mechanism to distribute to get feedback as preprod from product owners.
Usually when the ad-hoc version is approved, it is submitted to App store for publishing.
Software development following "agile-development" principles and practice. see: 'agile-development'
Android is a mobile operating system used primarily for smartphones and tablets.
It's owned by Google.
Android is based on a modified version of Linux kernel.
In 2021 more than 131 million devices were running on Android operating system.
The official development environment for Android is the "Android Studio" from Google.
API is a connection between computer programs; it can also be used as a connection between computers or computer networks.
It is a type of software intermediary, that allows two applications to talk to each other.
This software intermediary allows delivery of a request to the other application (server) and then relays a response back to the calling application (client).
Such communication between the applications facilitates resource/service usage of one application by the other.
Usually API, the intermediary, is defined as a set of protocols, procedures, and tools.
In short, API can be viewed as a set of functions, which allow other applications to access data and interact with external resources.
Since APIs bring applications together through well documented interface, performing pre-defined processes that work by sharing data is easy and accessible.
APIs work as middle man, allowing developers to focus on their core software project and consume APIs where necessary to enhance or augment the functionality and resources.
API abstraction enables speed and agility, by hiding all implementation and infrastructure behind the interface.
A plan (or blueprint) of how an API should look structurally, what data it uses to interact and their limitations. That is, it is a document that specifies how to use or build an Application Programming Interface. It may contain the details of the resources, methods available/used. It also specifies the requests and responses and the data used in each.
Development teams and architects of those who consume or develop the APIs would find the API spec define the endpoints, data, types, attributes, etc. with enough clarity. This helps in maintenance and updates of APIs much faster.
API Spec is quite important before development, since it helps avoid design issues and data flow problems before implementation and coding.
An API development involves developing APIs for an existing or proposed software, as per API specifications.
This helps an organization to tap into their proposed API usage/economy and opening up much practical consumption of the software through API Integration.
We develop APIs for your existing or proposed projects.
Integrate your system with internal, legacy or third party systems/platforms through APIs.
WNPL has integrated a wide range of third party APIs for their client projects (see a list of some common platform integrations).
WNPL provides these services:
The process of verifying the identity of an individual, processes or entity is quite important in protecting digital assets and information. The mechanism for such verification is called Authentication. That is, authentication is about how n individual, processes or entity prove that they are legitimate.
Even if and entity/individual is authenticated, it does not mean they can access resources. Resources are usually protected using authorization. That is, when it comes to accessing resources, Authentication is done before the authorization process.
Authentication is the ability to prove that an individual, processes or entity is genuinely who they claim to be. Authentication ensures networks and digital resources are kept secure. This ensures that any individual, processes or entity that is not authorized would not have access to an organisations network, data, websites, mobile apps, email/SMS systems, computing power, access to applications, etc.
Authentication proves your identity. Some examples: 1) Entering a username and password to login to an app or website. 2) Using biometrics to have access to a mobile phone. 3) Use of facial recognition to unlock secure access.
Commonly organisations use 3 factors for authentication: 1) Something you know (e.g.: password) 2) Something you have (egg: smart cards, secure dongles, etc.) 3) Something you are (e.g.: fingerprint, facial recognition, voice recognition)
Authorization is the process of giving access rights/privileges to resources to an individual, processes or entity. That is, Authorization gives permission to do or have something in a computer network. More formally, "to authorize" would mean to setup an access policy (to resources and processes)
Authorization is a process by which a server determines if the client has permission to use a resource or access a file. Authorization is usually coupled with authentication so that the server has some concept of who the client is that is requesting access.
Identification is the claim of a subject of its identity. Authentication is the proof of identity that is achieved through providing credentials to the access control mechanism. Authorization is the mechanism that determines the access level(s) of the subjects to the objects.
Example-1: When you login to an online website, you might be authorized to access only certain features of the site as a free user, while paid users would have access to more advanced features. That is, authorisation to access advanced features is limited to paid users only.
Example-2: After an employee login to an organisation’s website, the system limits what information the employees are allowed to access, as well as what features of the site they are have access to.
Availability of a computer network/system refers to the ability of its users to have access to the system and its resources without disruption.
Customers expect services without interruption or disruption. Computer systems are prone to many interruptions like power outage, faulty machines, software glitches, etc. Availability of a system (represented as percentage uptime) shows how much reliable the system is for critical tasks that requires no disruption.
Amazon Web Services (AWS) provides a Platform-As-A-Service (PaaS) facility for any user to setup their software, website, database, etc. in the cloud. AWS hosting refers to setting up your website, software, etc. on AWS infrastructure for use by all your intended audience.
There are parts of a computer program that are not accessible (seen) by users. Backend refers to such portions of a computer program. Most database operations and business logic are usually processed by backend systems. The Backend can comprise of any programming languages and could do multitude of functions including Database operations, Business Logic, Communication (email, SMS, push notifications, etc.). Though backend could operations could be triggered by user, it is also possible to start them using automated system (e.g.: Cron/scheduled jobs).
When we open a website in a browser, everything that happens before the page is displayed is part of the backend. For example, when you login to a website, the login process happens in the backend and you will see the result of the operation in the browser as a result page.
When the front-end requests are processed by the backed server, the database repository used by the backend server is called the backend database. Usually, the backend database is not directly accessible by the front-end server or front-end applications.
The development of code for the backend is referred to as backend development. This involves the configuration, coding and infrastructure management for the communication, logical operation and database management to render the information requested by the front end.
Backend server refers to the computing part of the back end that is responsible for retuning the requested information by the user. Backend server is responsible for receiving requests from the frontend, processing the request, applying logic and managing data repositories to deliver the requested information to front end.
In the IT industry, Business Analysis aims at identifying the needs of a business and come up with solutions to business problems. This is usually achieved through the analysis and subsequent interpretation of business processes/services (or software). Business analysis is usually followed by
Business analysis aims to improve business processes or identify and find solution to a business problem. These are steps:
WNPL analyses your business processes and software systems to come up with efficient solution to bring sustainable value. Our services include:
Cloud in IT sector generally means ‘Cloud computing’. This refers to any service that deliver hosted services over the internet, without direct active management by the user.
The cloud computing services can be divided into:
WNPL can help setup hosting client software in Cloud services like AWS, Azure and Google Cloud. For example, hosting a web site or web application as well as backend software of Mobile apps. WNPL has experience in setting up, securing and tuning for high availability of server infrastructure.
This is error message received in computer network communications when what was requested cannot be found. In most cases, this happens when the link that was requested is either broken or dead. The error indicates that the browser (or caller) was able to connect and communicate with the server, but the server was unable to find the requested resource.
The HTTP 404, 404 not found, 404, 404 error and "page not found" or "file not found" error message are part of 'Hypertext Transfer Protocol' standard response code.
Kronos (currently called ‘Ultimate Kronos Group’) is a workforce management and human capital management cloud platform developer.
Kronos is the world’s leading workforce management company whose cloud-based products are used by 10’s of thousands of companies and at least half of fortune 1000 companies, and serves more than 40 million people in more than 100 countries. It’s payroll and scheduling cloud platforms are relied upon by international giants like Whole Foods, GameStop and Honda.
Time and scheduling of workforce are critical operations, and can critically affect the profitability and operational efficiency of organisations. If not done correctly, these can raise compliance risks. Kronos helps in achieving business outcomes through seamless employee engagement, thereby controlling labour costs, and increasing productivity.
Kronos developed the integration component, Workforce Integration Manager (WIM), which designed to ease data sharing between Kronos and other systems. WIM allows integration with external and internal system within an organisation. It also allows the development of new products and services (from technical partners of Kronos) to extend the capabilities of the Kronos platform.
Kronos marketplace is an online platform from UKG that allows software Technology Partners to publish Plugins for the Kronos platform. Customers of Kronos can browse such third-party products, plugins and services.
Kronos merged with Ultimate Software (on April 1, 2020) and is now called ‘Ultimate Kronos Group’
WNPL provides consultation, business analysis, architecting, development, implementation, maintenance and support of plugins and integrations to the Kronos platform.
When developing a new product, the MVP approach encourages to build the first version of the product with just enough features (and value) that potential customers are willing to buy initially. This reduction or restriction of features help:
The MVP approach can benefit you in:
WNPL recommends MVP for new products:
NDA protects the information exchanged between two (or) parties. The information exchanged could include confidential material, knowledge, information, Multimedia material, etc. In short, NDA is a legal document signed by the parties involved to restrict the information exchanged to be within those set forth in the agreement.
WNPL encourages all their clients to enter into a non-Disclosure agreement when stating a new Software development project. This helps protect the idea and Intellectual Properties (IP) of the client. To more details and to sign an NDA to start project, please contact WNPL.
‘Pen Test’ or ‘ethical hacking’ is another name for Penetration testing.
Penetration testing (also known as ‘pen test’) is conducted to evaluate the security of a computer system. This is usually achieved through an authorized cyberattack on the system.
Cybercrime worldwide for companies will be above $10.5 trillion worldwide by year 2025. To counter this, your business needs to be vigilant and make sure none of the computer systems used are vulnerable. Penetration testing help the
The process of pen testing can be broken down into these 5 stages:
Uniting companies and their staff behind a common purpose is a big Management task. Staff base automates this through a simple to use yet efficient communications app and platform. Staff base allows the employees to reach out and engage across every channel
According to Staff base, more than 2000 companies use Staffbase communications platform and unifies communication of more than 2 million employees.
WNPL works with business to develop plugins and integrations to the Staffbase platform. WNPL team delivers this through consultation, business analysis, architecting, development, implementation, maintenance and support of plugins and custom integrations.
Staffbase marketplace is an online platform that allows software Technology Partners of Staffbase to publish Plugins and extensions to the Staffbase platform. Customers of Staffbase can browse such third-party products, plugins and services.
Zero Trust is a cyber security framework that requires all users to be authenticated. That is, all users who are inside or outside the organisation are considered untrusted until granted permission. Therefore, they need to be continuously validated for security after they are authenticated and authorized.
Zero trust aims to address the challenges faced by today’s business in securing cloud infrastructure, 3rd party business transactions, in-office workers, on-field workers and casual as well as work from home users. Zero trust architecture, sometimes known as perimeter less security, addresses this challenge trusting no one and nothing. That is, the Zero trust solutions should be capable of: “Never trust, always verify” and “treat every data flow, user, application, workload, device, network as untrusted”.