1300 633 225 Request free consultation

Glossary

AI Governance

Discover the importance of AI Governance on WNPL's glossary. Ensure ethical, transparent AI use within your organization

Model Deployment

Learn about model deployment strategies, challenges, and best practices for AI systems on WNPL's glossary page. Ensure scalability and reliability.

Natural Language Processing (NLP)

Explore how Natural Language Processing enhances AI interactions. Learn NLP applications from chatbots to sentiment analysis.

Markov Chain

Dive into our Markov Chain glossary page to understand how these models predict future states in stochastic processes

Data Fabric

Understand what Data Fabric is. This glossary explains the details and exposes some commonly asked questions.

Cloud Application Development

Explore cloud application development on WNPL's glossary page. Learn how it revolutionizes software creation with scalability and flexibility.

Data Visualization

Discover the power of data visualization on WNPL's glossary page. See how it transforms data into actionable insights across different fields and applications.

Data Lakehouse

Understand what Data Lakehouse is. This glossary explains the details and exposes some commonly asked questions.

AI-driven Innovation

AI-driven Innovation is reshaping industries. Discover how AI technologies foster new products, services, and business models.

Data Management

Discover Data Management strategies for modern businesses on WNPL's glossary, covering governance, quality, and technology best practices

Implementation and Prototype

Successful AI Implementation starts with a solid Prototype. Discover the journey from initial concept to full-scale deployment.

AutoML (Automated Machine Learning)

AutoML simplifies AI model development. Discover how Automated Machine Learning accelerates AI projects and innovation.

Back Propagation

Explore back propagation in AI on our glossary page: Learn how it refines learning through errors for better accuracy

Gradient Descent

Unpack gradient descent in WNPL's glossary: optimizing neural networks by minimizing cost functions for improved AI accuracy.

Backend Server

Read and understand what Backend Server is, its practical uses and commonly asked questions in Software systems

Authentication

Explore the essentials of authentication in cybersecurity on WNPL's glossary page. Understand its role in protecting digital assets

Expert Systems

Learn how Expert Systems apply human knowledge to solve complex problems on our detailed glossary page

AI Strategy and Roadmapping

Plan your AI journey with insights on AI Strategy and Roadmapping at WNPL. Align AI initiatives with your business goals effectively.

AI Prototype

Learn about developing AI Prototypes at WNPL. Test and refine your AI solutions efficiently before full-scale deployment

Business Analysis

Business Analysis is key to strategic planning. Discover how analyzing business needs leads to successful project outcomes.

Convolutional Neural Networks (CNNs)

What are Convolutional Neural Networks (CNNs)? This glossary exposes commonly asked questions.

Real-time Analytics

Dive into real-time analytics with WNPL's glossary. Instant data analysis for agile decision-making. See its impact across industries and applications.

Authorization

Dive into the world of authorization with WNPL's glossary. Learn how it secures data by defining user permissions and access

Business Intelligence (BI)

Explore the essentials of Business Intelligence on WNPL's glossary page: from BI's role in decision-making to its components and implementation.

TensorFlow

Learn about TensorFlow, the engine behind AI's advancements, on our detailed glossary page

Activation Function

Discover the role of activation functions in neural networks, including types like ReLU and Sigmoid, on WNPL's glossary page. Optimize your AI models.

Data Mesh

Understand what Data Mesh is. This glossary explains the details and exposes some commonly asked questions.

Vector database

Understand what Vector database is. This glossary explains the details and exposes some commonly asked questions.

Backend Database

Understand what Backend Database is and read some of frequently asked questions in our glossary.

Recurrent Neural Networks (RNNs)

What are Recurrent Neural Networks (RNNs)? This glossary exposes commonly asked questions.

Cloud-based AI Services

Cloud-based AI Services accelerate innovation. Discover how cloud AI provides scalable, cost-effective solutions for businesses.

Hala Point

Hala Point, the neuromorphic computing chip from Intel, ready to revolutionize artificial intelligence by processing information, is designed to mimic the neural structure of the human brain. Deisnged for rapid, energy-efficient computation that is particularly adept at handling complex sensory data and decision-making tasks.

Operational efficiency

Operational Efficiency is key to business success. Discover how to optimize operations for maximum efficiency and productivity.

API Integration

Understand the term 'API Integration". Know about its practical applications, choices for busnesses and commonly asked questions.

Text Mining

Text mining's power to unlock trends and insights from unstructured data is detailed.

Machine Learning (ML)

Explore the essentials of Machine Learning, its impact, and applications across industries. Dive into ML's transformative potential today

AI Development

Explore AI Development on WNPL's glossary page: From defining AI to lifecycle and ethical considerations, unlock how AI transforms businesses.

Large Language Models (LLMs)

Understand what Large Language Models (LLMs) are. Also, read related frequently asked questions

ML Consultancy

Uncover ML Consultancy essentials on WNPL's glossary: Data preparation, model selection, and scaling insights for enhancing decision-making and efficiency.

API Development

Dive into API Development with WNPL's glossary. Understand its lifecycle, tools, and security practices for robust software solutions.

Cybersecurity and AI

Strengthen your defenses with AI in Cybersecurity. Learn how AI enhances threat detection and response for robust security.

Data Security

Navigate data security essentials with WNPL's glossary. Protect digital information from threats and ensure compliance with global data protection regulations.

AI for Predictive Analytics

Unlock the potential of AI for Predictive Analytics on WNPL. Enhance decision-making with data-driven insights and forecasts

Zero Trust

Learn about the zero trust model's approach to cybersecurity: Never trust, always verify. Details on WNPL's glossary page

Zero Day Attacks

Discover the critical challenge of zero day attacks and how they exploit unknown vulnerabilities. Insights available on WNPL's glossary

Backpropagation

Learn about backpropagation from WNPL's glossary: the core algorithm for training neural networks in deep learning applications.

Unsupervised Learning

Explore unsupervised learning in WNPL's glossary: mastering data patterns without labeled outcomes for AI innovation.

AI for Business

Leverage AI for Business to drive growth, enhance decision making and improve operational efficiency

Big Data

Our Big Data glossary page unravels the complexity of handling vast amounts of data in today's digital era. Learn more!

AI Discovery Workshop

Dive into our AI Discovery Workshop glossary and FAQs to navigate AI integration, strategic insights, and practical steps for your business success.

Deep Learning (DL)

Discover the power of Deep Learning in AI: From neural networks to real-world applications, learn how DL is shaping the future.

Transformers

What are Transformers? This glossary exposes commonly asked questions.

Data requirements

Understanding Data Requirements is crucial for AI success. Learn about the importance of quality data in AI project outcomes.

Machine to Machine (M2M)

Explore M2M communication's role in automating and optimizing operations. Learn how Machine to Machine tech drives efficiency.

AI Readiness

Dive into our comprehensive AI readiness glossary and FAQs to navigate the essentials of AI implementation and prepare your business for a seamless transition.

Ethical AI

Discover essential insights on Ethical AI for business and tech leaders. Explore key concepts, challenges, and strategies for fostering trust and accountability

Data Modeling

Learn about Data Modeling techniques and their impact on Big Data and BI processes, presented on WNPL's comprehensive glossary page

Long Short-Term Memory (LSTM)

Discover LSTM in WNPL's glossary: enhancing neural networks to remember information for long periods for complex sequence tasks.

Compliance and Regulatory Considerations

Navigate Compliance and Regulatory Considerations in business. Learn strategies for adhering to laws and ethical standards.

Data Governance

Data Governance is crucial for AI integrity. Learn about managing data quality, privacy, and compliance in AI projects.

Loihi 2 Processor

The Loihi 2 processor is Intel's second-generation neuromorphic computing chip.

Image Segmentation

Uncover the role of image segmentation in enhancing product quality and customer engagement, detailed.

Data Mining

Dive into data mining techniques, applications, and challenges on WNPL's glossary page. Leverage your data for insightful business decisions.

Stream Processing

Explore stream processing on WNPL's glossary page: Real-time data analysis for immediate insights. Discover technologies and applications in various industries.

Variational Autoencoders (VAEs)

What are Variational Autoencoders (VAEs)? This glossary exposes commonly asked questions.

AI Consultancy

Dive into AI Consultancy with WNPL: Identifying AI opportunities, strategic planning, and ROI measurement for business leaders and tech innovators

Reinforcement Learning (RL)

What is Reinforcement Learning (RL)? This glossary exposes commonly asked questions.

What is Generative AI?

What is Generative AI? Understand this fast growing technology

Digital Transformation

Digital Transformation is key to staying competitive. Discover how leveraging technology can propel your business forward

Apache Iceberg

Understand what Apache Iceberg is. This glossary explains the details and exposes some commonly asked questions.

BrainChip

Discover BrainChip's impact on AI with its innovative processors that enhance real-time decision-making at the edge.

MemComputing

Learn how MemComputing transforms data center operations by significantly speeding up processing times.

App Store

Unveil the secrets of app store success with WNPL's glossary. Learn optimization strategies for better visibility and ranking.

Explainable AI (XAI)

Explore the essentials of Explainable AI (XAI) on WNPL's glossary page. Understand how XAI makes AI decisions transparent and trustworthy

Sentiment Analysis

Discover how sentiment analysis transforms customer feedback into actionable insights.

Data warehouse

Understand what Data warehouse is. This glossary explains the details and exposes some commonly asked questions.

Computer Vision

Dive into computer vision's impact on industries with WNPL's glossary page, covering its definition, applications, and future trends.

Turing Test

Our Turing Test glossary page delves into the ultimate AI challenge: achieving indistinguishable intelligence from humans

AI Model Validation

Dive into AI Model Validation techniques at WNPL. Learn how to ensure your AI models are accurate and reliable for business applications

Neural Network

Discover neural networks on our glossary page: Unravel how they mimic the brain to solve complex problems in AI.

Extract, Transform, Load (ETL)

Uncover ETL processes in WNPL's glossary: The backbone of data warehousing. Learn how it supports analytics and decision-making with data integration.

Supervised Learning

Dive into supervised learning with WNPL's glossary: training AI models on labeled data for precise predictions and analysis.

Data Lakes

Understand what Data lake is. This glossary explains the details and exposes some commonly asked questions.

Predictive Analytics

Predictive Analytics: Driving business strategies with data. Learn how to use predictive models for informed decision-making.

Regression

Visit our glossary to understand regression's pivotal role in AI, enabling accurate predictions and insights from data

Predictive AI

Explore the power of Predictive AI on our glossary page, where AI's predictive capabilities are explained.

Training Data

Uncover the significance of quality training data in AI development on WNPL's glossary page. Learn about collection, preparation, and ethical considerations.

Model Evaluation

Learn about model evaluation techniques and their importance in predictive analytics.

Scenario Modelling

Scenario Modelling: Shaping the future with AI. Learn how to use AI for effective planning and forecasting in uncertain times.

Quantum computing

Understand what Quantum computing is. This glossary exposes some related commonly asked questions also.

Memory Processing Units (MPUs)

See how Memory Processing Units streamline complex computations by integrating processing power with data storage.

Batch Processing

Learn about batch processing in WNPL's glossary: Efficient data handling for analytics. Understand its role in data management and business intelligence.

The Internet of Things (IoT)

Discover how IoT connects and transforms the world. Learn about the Internet of Things applications, benefits, and challenges.

Availability

Understand the importance of availability in IT on WNPL's glossary page. Strategies for minimizing downtime and ensuring business continuity.

Epoch

Understand the importance of epochs in machine learning training, how to determine their optimal number, and their impact on model accuracy on WNPL's glossary page.

NoSQL

Explore NoSQL databases with WNPL's glossary. Understand their role in handling big data and enhancing application scalability and performance.

ASP net

Unlock insights on custom Asp.net development. Discover key terms, best practices, and strategies for robust Asp.net web solutions

Neuromorphic Computing

A technology inspired by the structure and function of the human brain. It involves designing computer chips that mimic the brain’s architecture to process information more efficiently and effectively than traditional computers.

Artificial Intelligence (AI)

Explore the essentials of AI with our comprehensive glossary, covering everything from machine learning to ethical AI use and future trends.

API Specification

Explore the essentials of API Specification on WNPL's glossary page. Learn how it streamlines collaboration and boosts software integration.

Non-Disclosure Agreement

Know what a Non-Disclosure Agreement is - understand its purpose, types and Legal Considerations.

TrueNorth Chip

Uncover how IBM's TrueNorth Chip sets new standards in energy efficiency and computational power for AI systems.

Application Programming Interface

Discover the power of APIs on WNPL's glossary page. Understand how they enable seamless integration and innovation in software development.

AI Compliance

Navigate the complexities of AI Compliance with WNPL's glossary. Stay ahead of regulations and ethical standards in AI use.

Big Data Analytics

Big Data Analytics transforms decision-making. Learn how leveraging big data offers insights and competitive advantages.

Strategic Planning

Explore strategic planning: frameworks, tools, and FAQs for aligning goals with your mission, vision, and values for business success.

Decision Tree Learning

Dive deeper into Decision Tree Learning with our glossary, understanding its role in evolving AI decision-making processes.

Custom Database Development

Explore our comprehensive glossary on custom database development. Uncover its tools, significance, and diverse industry use cases.

Decision Tree

Explore Decision Tree Learning on our glossary page and see how AI learns to make decisions from data

Bias

Explore the impact of bias in AI and learn strategies for mitigation on WNPL's glossary page. Understand types, causes, and effects in machine learning.

Generative Adversarial Networks (GANs)

What are Generative Adversarial Networks (GANs)? This glossary exposes commonly asked questions.

Penetration Test (Pen Test)

Uncover the significance of penetration testing in identifying vulnerabilities. Visit WNPL's glossary for insights into enhancing security

Real-time Data Analytics

Real-time Data Analytics transforms decision-making. Discover how instant data analysis drives business strategies and outcomes.

Predictive Maintenance

Enhance operational reliability with Predictive Maintenance. Discover AI's role in forecasting equipment failures and downtime.

Quantum AI

Understand what Quantum AI is. This glossary exposes some related commonly asked questions also.

Enterprise AI

Transform your business with AI Enterprise solutions. Visit WNPL's glossary for strategies on integrating AI across operations.

Time Series Analysis

Explore time series analysis for forecasting and anomaly detection across industries.

A/B Testing

What A/B testing?

This is a method to compare two versions of an app or website or page (or any other resource) against each other to determine which one performs better. A/B testing is also known as split testing or bucket testing.

Where is A/B testing used?

A/B testing is done extensively in marketing, where you might split the audience into two (or more) groups to run different variations of the same campaign. Similarly, A/B testing can be used to find the best way to organise screen elements when building a new software product.

Use of A/B testing in Google Ads marketing

For example, in Google Ads marketing, you might show one version of the ad to, say, half the audience and another version to another half. This allows to pick the best performing ad. This can be done on more variations, until you find the best performing ad. The same approach could be used for optimising landing pages for best performance.

Ad-hoc build

What is ad-hoc build?

Ad Hoc distribution of iOS apps allows an app to be distributed to a finite list of known iOS devices. The app is not published in app store, instead, the installation files are provided outside of the app store directly to such devices.

What is the use of an ad-hoc build?

Ad Hoc version of the app is usually made before it is published to app store. This approach allows the app to be tested on a known set of devices. This is also used as a mechanism to distribute to get feedback as preprod from product owners.

Usually when the ad-hoc version is approved, it is submitted to App store for publishing.

Steps to publish ad hoc app

  • Create ad hoc provisioning profile in the member centre at developer.apple.com
  • Open up your XCode project
  • Choose: Product > Archive, and click "Distribute" in the XCode organizer window (when the operation is finishes).
  • Click Save for Ad Hoc Deployment
  • Choose your ad hoc provisioning profile, and click Export.

Agile

What is agile?

  • Agile is an iterative approach to project management and software development
  • This helps software development teams to deliver smaller versions of a product being built in small increments
  • This approach intents to deliver value to their customers faster and with fewer setbacks.
  • Instead of delivering everything on a final release/launch, the agile team delivers work in small increments thereby decreasing risk considerably
  • Agile approach gives importance to individuals and interactions over processes and tools
  • In agile, working software is preferred over comprehensive documentation, since customer collaboration is considered pivotal in this approach

What Are the Principles of Agile Project Management?

  • Satisfy Customers Through quick & continuous delivery of incrementally increasing product releases
  • Changing Requirements are welcome, even Late in the Project, thus providing competitive advantage for the customer
  • Deliver Value Frequently by releasing versions of the software
  • Break the Silos of the Project by clients/business-people and developers working together as often as possible throughout the project
  • Build Projects Around Motivated Individuals, thereby reducing or even eliminating micro management. Provide them the environment and trust them to complete their job.
  • The Most Effective Way of Communication is Face-to-face. Of course, in some cases you can have a phone call, or even email - the point is that avoid unnecessary documentation and written requests; in most cases a face-to-face meeting saves time and clarifies things much quicker and better
  • Working Software is the Primary Measure of Progress. It does not matter how many hours or how much resources have been consumed. A working software is the most important KPI
  • Developers, project owners and users must Maintain a Sustainable Working Pace indefinitely.
  • Continuous Excellence of creating high quality software Enhances Agility
  • If something can be done in a simple way, prefer that
  • Motivated teams which are Self-organizing Teams Generate Most Value by creating best architectures, requirements, and designs to deliver great software projects
  • At Regularly intervals the team should reflect and adjust ways/approaches to work more efficiently and boost effectiveness

Agile development

What are the 6 steps in the agile development methodology?

  • Project planning. Create a plan with the end goal of quality, features and maintenance in mind
  • Breakdown the Product into features. Make a product backlog, which is a list of all the features
  • Release planning. Release is split out into smaller 'sprints' where some of the backlog items are developed
  • Sprint planning. Before starting each individual sprint, a meeting is conducted with stakeholders to ascertain what is achieved in that sprint.
  • Daily stand-up. Every day, to ascertain what is to be achieved that day, find if there are any bottlenecks and to make sure everyone is on the same page.
  • Sprint review and retrospective. Two meetings: (1) Review meeting with stakeholders to show what has been achieved. (2) Retrospective meeting with the team to find out what could be done better, what was accomplished/not-accomplished, what changes to make for the next sprint.

What are principles of Agile development?

  • Collaboration
  • Open Communication
  • Trust
  • Independence
  • Efficiency
  • Continuous Delivery

Agile software development

Software development following "agile-development" principles and practice. see: 'agile-development'

Amazon web services (AWS)

What is Amazon Web Services (AWS)?

  • AWS (Amazon Web Services) is the leading and comprehensive infrastructure as a service (IaaS) cloud computing platform from Amazon.
  • Compared to is competitors, AWS is functionality-rich mostly because of its long experience in the market
  • It offers software as a service (SaaS) in addition to platform as a service (PaaS)
  • AWS provides servers, storage, networking, load balancing, database, remote computing, email, mobile development, workflow systems, big data services, Artificial Intelligence systems, Content delivery and security.
  • AWS offers more than 200 fully featured services from data centres globally
  • AWS offers free training and get unlimited access to 100s of new courses from AWS experts

What is alternative for AWS?

  • Google Cloud Platform, or GCP
  • Microsoft Azure.
  • IBM Cloud.
  • Oracle Cloud Infrastructure (Gen 2)
  • VMware Cloud on AWS.
  • Alibaba Cloud - International.
  • vCloud Air powered by OVH.
  • Tencent Cloud - International.

Android

What is Android?

Android is a mobile operating system used primarily for smartphones and tablets.
It's owned by Google.
Android is based on a modified version of Linux kernel.
In 2021 more than 131 million devices were running on Android operating system.
The official development environment for Android is the "Android Studio" from Google.

Android studio

What is Android Studio?

  • Android Studio is the official Integrated Development Environment for Android Operating system development
  • This used for building apps for Android Phones, Android Tablets, Android Wearables, Android TV and Android Auto
  • Android Studio is a free software and you can download it for personal or business use
  • Android Studio is available for download targeting many operating systems including Windows

Application Programming Interface (API)

What is an Application Programming Interface (API)?

API is a connection between computer programs; it can also be used as a connection between computers or computer networks.
It is a type of software intermediary, that allows two applications to talk to each other.
This software intermediary allows delivery of a request to the other application (server) and then relays a response back to the calling application (client).
Such communication between the applications facilitates resource/service usage of one application by the other.
Usually API, the intermediary, is defined as a set of protocols, procedures, and tools.
In short, API can be viewed as a set of functions, which allow other applications to access data and interact with external resources.

Why do we use API?

Since APIs bring applications together through well documented interface, performing pre-defined processes that work by sharing data is easy and accessible.
APIs work as middle man, allowing developers to focus on their core software project and consume APIs where necessary to enhance or augment the functionality and resources.
API abstraction enables speed and agility, by hiding all implementation and infrastructure behind the interface.

API Specification

What is API specification?

A plan (or blueprint) of how an API should look structurally, what data it uses to interact and their limitations. That is, it is a document that specifies how to use or build an Application Programming Interface. It may contain the details of the resources, methods available/used. It also specifies the requests and responses and the data used in each.

Development teams and architects of those who consume or develop the APIs would find the API spec define the endpoints, data, types, attributes, etc. with enough clarity. This helps in maintenance and updates of APIs much faster.

API Spec is quite important before development, since it helps avoid design issues and data flow problems before implementation and coding.

API Development

What is API Development?

An API development involves developing APIs for an existing or proposed software, as per API specifications.
This helps an organization to tap into their proposed API usage/economy and opening up much practical consumption of the software through API Integration.

API Integration

What is API Integration?

  • API integration refers to creating a means to consume an API by passing request data to an end point and receiving return data.
  • The end points and data passed are all defined usually through 'API Specification' provided by the entity providing the API

Why is API Integration used?

  • API integration is used to seamlessly connect organizations to automate business processes.
  • The integration also allows the sharing and embedding of data and other resources between applications.
  • An example of API integration is using the API provided by Facebook to submit a post on a user's timeline.

What are 3 examples of API integrations?

  • Pay with PayPal - allows websites to use the PayPal platform to perform financial transactions
  • Twitter Bots - allows to perform actions such as tweeting, re-tweeting, liking, following, etc.
  • Google Maps API - allows searching nearby restaurants, etc. with respect to your current or selected location

What API integrations services does WNPL provide?

We develop APIs for your existing or proposed projects.
Integrate your system with internal, legacy or third party systems/platforms through APIs.
WNPL has integrated a wide range of third party APIs for their client projects (see a list of some common platform integrations).

App Development process

What is App Development process?

  • App development process refers to the steps taken in developing an App.
  • Though there are certain predefined patterns/steps available for app development, certain apps follow slightly differing methodologies/steps in their development, based on their requirements.

What are some common steps in Mobile App development?

  • Customer identification and segmentation
  • Analysis and Planning
  • User Interface and User Experience (UI/UX) design
  • Wireframing and Mock-up
  • Software development
  • Testing
  • Publishing the app
  • Support & enhancements

App distribution

What is App distribution?

  • The process of releasing an app and making it accessible to wide set of users is called App distribution.
  • This is done in order to promote the app to such user base, as well as to make the app available by the intended user base.
  • App developers use distribution channels to promote their app to maximize the returns and improve app economy.

What are some app distribution methods?

  • Through an app marketplace - E.g.: Google Play, App store from Apple, etc.
  • As email attachment - Send the installation file as attachment. The user will be prompted to install when they open the attachment in a supported mobile device.

App Store

What is App Store?

  • App store is a platform where Mobile apps are available for installation in your compatible mobile devices.
  • Though 'App store' is the name given to Apple App store, the name 'App store' is sometimes generically used for other stores also.
  • Another important platform where apps targeting android devices is Google's Play store

What does the App Store do?

  • App store (and also Google Play store) allows you to search, and discover mobile apps.
  • These platforms make available the description, the app logo/icon, screenshots, reviews, video or trailer, user base counts, etc.
  • The platform allows you to download and install such application.

Artificial Intelligence

What is Artificial Intelligence (AI)?

  • Machines can be programmed to demonstrate intelligence, similar to the intelligence displayed by humans.
  • Modern AI systems aims at developing computer systems able to perform tasks that normally require human intelligence.
  • AI can perform complex tasks such as recognition, decision making, selection, classification, perception, etc.

Which Artificial Intelligence services do WNPL provide?

WNPL provides these services:

  • Preliminary study of proposed AI system for feasibility
  • AI systems model development
  • Deep learning
  • AI deployment
  • AI system integration

Asp.net

What is Asp.net?

  • ASP.NET is a server-side web-application framework to produce dynamic web pages.
  • It has features for programmers to build interactive, data-driven dynamic web sites, applications and services.
  • Built by Microsoft, ASP.net is used by many programmers to build websites and web apps using HTML, CSS, and JavaScript.
  • ASP.net uses extensible and reusable components available
  • ASP.NET applications are deployed as compiled codes
  • It works on top of the HTTP protocol to provide a browser-to-server communication.
  • ASP.net has now evolved in Asp.net core, which runs on multiple operating systems

Asp.net core

What is Asp.net core?

  • ASP.NET Core is a framework from Microsoft that works on .NET Core platform to produce dynamic web pages, applications and services.
  • It is a free and open-source web framework, that succeeded the ASP.NET.
  • Latest version (3+) needs .NET Core runtime.

Asp.net MVC

What is Asp.net MVC?

  • Microsoft developed ASP.NET MVC web application framework. It implements the model–view–controller (MVC) pattern and is open-source software (except for the ASP.NET Web Forms component).
  • Net comprises both frontend and backend languages. As for example, ASP.NET is used as backend and C# & VB.NET are used for frontend development. ASP.NET is no longer in active development.
  • The .NET framework supports more than 60 programming languages, of which 11 are developed by Microsoft. Usually, Asp.net MVC applications are hosted on IIS webserver software.
  • In Asp.net MVC, since the views are compiled before use, they are slow on first occasion; after which it renders fast.

Authentication

What is the authentication?

The process of verifying the identity of an individual, processes or entity is quite important in protecting digital assets and information. The mechanism for such verification is called Authentication. That is, authentication is about how n individual, processes or entity prove that they are legitimate.
Even if and entity/individual is authenticated, it does not mean they can access resources. Resources are usually protected using authorization. That is, when it comes to accessing resources, Authentication is done before the authorization process.

What is the purpose of authentication?

Authentication is the ability to prove that an individual, processes or entity is genuinely who they claim to be. Authentication ensures networks and digital resources are kept secure. This ensures that any individual, processes or entity that is not authorized would not have access to an organisations network, data, websites, mobile apps, email/SMS systems, computing power, access to applications, etc.

What is an authentication example?

Authentication proves your identity. Some examples: 1) Entering a username and password to login to an app or website. 2) Using biometrics to have access to a mobile phone. 3) Use of facial recognition to unlock secure access.

What are the 3 authentication methods?

Commonly organisations use 3 factors for authentication: 1) Something you know (e.g.: password) 2) Something you have (egg: smart cards, secure dongles, etc.) 3) Something you are (e.g.: fingerprint, facial recognition, voice recognition)

Authorization

What is Authorization?

Authorization is the process of giving access rights/privileges to resources to an individual, processes or entity. That is, Authorization gives permission to do or have something in a computer network. More formally, "to authorize" would mean to setup an access policy (to resources and processes)

What is authorization process?

Authorization is a process by which a server determines if the client has permission to use a resource or access a file. Authorization is usually coupled with authentication so that the server has some concept of who the client is that is requesting access.

What is difference between identification and authorization?

Identification is the claim of a subject of its identity. Authentication is the proof of identity that is achieved through providing credentials to the access control mechanism. Authorization is the mechanism that determines the access level(s) of the subjects to the objects.

What is an authorization example?

Example-1: When you login to an online website, you might be authorized to access only certain features of the site as a free user, while paid users would have access to more advanced features. That is, authorisation to access advanced features is limited to paid users only.
Example-2: After an employee login to an organisation’s website, the system limits what information the employees are allowed to access, as well as what features of the site they are have access to.

Availability

What is ‘availability’ of a computer/network system?

Availability of a computer network/system refers to the ability of its users to have access to the system and its resources without disruption.

Customers expect services without interruption or disruption. Computer systems are prone to many interruptions like power outage, faulty machines, software glitches, etc. Availability of a system (represented as percentage uptime) shows how much reliable the system is for critical tasks that requires no disruption.

AWS hosting

Amazon Web Services (AWS) provides a Platform-As-A-Service (PaaS) facility for any user to setup their software, website, database, etc. in the cloud. AWS hosting refers to setting up your website, software, etc. on AWS infrastructure for use by all your intended audience.

Backend

What is backend?

There are parts of a computer program that are not accessible (seen) by users. Backend refers to such portions of a computer program. Most database operations and business logic are usually processed by backend systems. The Backend can comprise of any programming languages and could do multitude of functions including Database operations, Business Logic, Communication (email, SMS, push notifications, etc.). Though backend could operations could be triggered by user, it is also possible to start them using automated system (e.g.: Cron/scheduled jobs).

What is an example of Backend?

When we open a website in a browser, everything that happens before the page is displayed is part of the backend. For example, when you login to a website, the login process happens in the backend and you will see the result of the operation in the browser as a result page.

What is the difference between front end and back end?

  • The term “front-end” refers to the user side of the system. It includes the user interface and might include user experience components.
  • On the contrary, “back-end” means that part of the system that serves the front end, while being otherwise inaccessible to users. It includes servers, database, application and communication servers that work behind the scenes.

Backend communication

What is backend communication?

  • The frontend of the computer systems that handles user input communicates with the backend servers, to fetch the requested information. The backend server uses the applications running on it and the connected databases to return the requested information back to the front end.
  • Usually, frontend and backend software run of different machines.

How do front and backend communicate?

  • Http requests are often used for the communication between Frontend and backend
  • The communication channels between them could be regulated through security screening and possibly separated using firewalls.

Backend Database

What is Backend Database?

When the front-end requests are processed by the backed server, the database repository used by the backend server is called the backend database. Usually, the backend database is not directly accessible by the front-end server or front-end applications.

What are some examples of front end and backend databases?

  • Front-end database examples: SQLite database used in browsers, SQLite in iOS mobile devices
  • Backend database examples: SQL Server, Dynamo DB, My SQL, Mongo DB

Backend Development

What is Backend Development?

The development of code for the backend is referred to as backend development. This involves the configuration, coding and infrastructure management for the communication, logical operation and database management to render the information requested by the front end.

Backend Server

What is backend server?

Backend server refers to the computing part of the back end that is responsible for retuning the requested information by the user. Backend server is responsible for receiving requests from the frontend, processing the request, applying logic and managing data repositories to deliver the requested information to front end.

Business analysis

What is Business analysis?

In the IT industry, Business Analysis aims at identifying the needs of a business and come up with solutions to business problems. This is usually achieved through the analysis and subsequent interpretation of business processes/services (or software). Business analysis is usually followed by

  • Documentation of the findings and interpretations
  • Recommendations of changes needed to improve the processes to increase value to the business
The recommendations and solutions may include software system development, changes, policy development or strategic planning.

What is Business analysis?

Business analysis aims to improve business processes or identify and find solution to a business problem. These are steps:

  • Understand what a business does
  • Analyse how the business does each of the activity/process it does
  • Analyse data involved in the process to identify the business problem/process
  • Use the data to come up with ways to improve the processes or to solve the problem
  • Articulate the steps or tasks to make these improvements
  • Analyse and identify impact and risks of such steps to the business
  • Provide Architectural guidelines and design to support these tasks

What is Business analysis?

WNPL analyses your business processes and software systems to come up with efficient solution to bring sustainable value. Our services include:

  1. Understand and validate business needs
    1. Gather background information
    2. Identify stakeholders
    3. Identify Subject matter experts
    4. Understand business objectives
  2. Analyse existing system/process
    1. Analyses the current processes, data and software systems used
  3. Identify suitable solution
    1. List available solutions and alternatives
    2. Document risks and effectiveness
    3. Identify the proposed solution
    4. Validate the proposed solution
  4. Enunciate implementation steps

Cloud

What does Cloud mean in computing?

Cloud in IT sector generally means ‘Cloud computing’. This refers to any service that deliver hosted services over the internet, without direct active management by the user.

What are the 3 main categories of cloud computing?

The cloud computing services can be divided into:

  1. Software as a Service (SaaS)
  2. Platform as a service (PaaS)
  3. Infrastructure as a service (IaaS)

Who are the main IaaS service providers?

  • Amazon EC2
  • Microsoft Azure
  • Google Compute Engine
  • IBM Cloud

What cloud-based Services does WNPL offer?

WNPL can help setup hosting client software in Cloud services like AWS, Azure and Google Cloud. For example, hosting a web site or web application as well as backend software of Mobile apps. WNPL has experience in setting up, securing and tuning for high availability of server infrastructure.

HTTP 404

What is HTTP 404 error?

This is error message received in computer network communications when what was requested cannot be found. In most cases, this happens when the link that was requested is either broken or dead. The error indicates that the browser (or caller) was able to connect and communicate with the server, but the server was unable to find the requested resource.

The HTTP 404, 404 not found, 404, 404 error and "page not found" or "file not found" error message are part of 'Hypertext Transfer Protocol' standard response code.

Kronos

What is Kronos?

Kronos (currently called ‘Ultimate Kronos Group’) is a workforce management and human capital management cloud platform developer.

Who uses Kronos?

Kronos is the world’s leading workforce management company whose cloud-based products are used by 10’s of thousands of companies and at least half of fortune 1000 companies, and serves more than 40 million people in more than 100 countries. It’s payroll and scheduling cloud platforms are relied upon by international giants like Whole Foods, GameStop and Honda.

Why use Kronos?

Time and scheduling of workforce are critical operations, and can critically affect the profitability and operational efficiency of organisations. If not done correctly, these can raise compliance risks. Kronos helps in achieving business outcomes through seamless employee engagement, thereby controlling labour costs, and increasing productivity.

What is Kronos integration?

Kronos developed the integration component, Workforce Integration Manager (WIM), which designed to ease data sharing between Kronos and other systems. WIM allows integration with external and internal system within an organisation. It also allows the development of new products and services (from technical partners of Kronos) to extend the capabilities of the Kronos platform.

What is Kronos marketplace?

Kronos marketplace is an online platform from UKG that allows software Technology Partners to publish Plugins for the Kronos platform. Customers of Kronos can browse such third-party products, plugins and services.

What is Ultimate Kronos Group (UKG)?

Kronos merged with Ultimate Software (on April 1, 2020) and is now called ‘Ultimate Kronos Group’

What Services do WNPL provide for the Kronos Platform?

WNPL provides consultation, business analysis, architecting, development, implementation, maintenance and support of plugins and integrations to the Kronos platform.

Minimum Viable Product (MVP)

What is Minimum viable product?

When developing a new product, the MVP approach encourages to build the first version of the product with just enough features (and value) that potential customers are willing to buy initially. This reduction or restriction of features help:

  • To launch the product quickly
  • Reduce resources needed and budget for the first release
  • Test the market quickly and at a smaller budget
  • Analyse use and do business analysis to come up with the final product
In some cases MVP does not target all potential customers of the final product – instead it might only target certain segments of the customer base.

Why use the MVP approach for product development?

The MVP approach can benefit you in:

  1. User Centric development
  2. Rapid testing of the product
  3. Analyse the market quickly
  4. Reduce costs and resources
  5. Shape the final product

Why does WNPL advocate MVP for new product releases?

WNPL recommends MVP for new products:

  1. It helps to avoid unwanted and unneeded features from the initial product.
  2. It allows to analyse users and user base to identify and design the best User Interfaces and User Experience (UI/UX)
  3. Provide data to business owners to help marketing efforts

Non-Disclosure Agreement

What is Non-Disclosure Agreement?

NDA protects the information exchanged between two (or) parties. The information exchanged could include confidential material, knowledge, information, Multimedia material, etc. In short, NDA is a legal document signed by the parties involved to restrict the information exchanged to be within those set forth in the agreement.

Does WNPL provide their own Non-Disclosure Agreement?

WNPL encourages all their clients to enter into a non-Disclosure agreement when stating a new Software development project. This helps protect the idea and Intellectual Properties (IP) of the client. To more details and to sign an NDA to start project, please contact WNPL.

Pen test

What is Pen test?

‘Pen Test’ or ‘ethical hacking’ is another name for Penetration testing.

Penetration test

What is Penetration testing?

Penetration testing (also known as ‘pen test’) is conducted to evaluate the security of a computer system. This is usually achieved through an authorized cyberattack on the system.

Why is penetration testing needed?

Cybercrime worldwide for companies will be above $10.5 trillion worldwide by year 2025. To counter this, your business needs to be vigilant and make sure none of the computer systems used are vulnerable. Penetration testing help the

What are the 5 stages in Penetration Testing?

The process of pen testing can be broken down into these 5 stages:

  1. Reconnaissance – Gather information about the target system
  2. Scanning - Scan the target system for vulnerable entry points
  3. Enumeration- Gather more information about groups, shares, email addresses, etc. of the target system. There are many tools available to assist and automate this
  4. Penetration – Try to access the system through vulnerabilities identified
  5. Reporting – All information from the above 4 stages is compiled. Usually, next course of action are also advised.

What is Penetration testing?

  1. Astra Pentest
  2. NMAP
  3. Zed Attack Proxy
  4. Acunetix
  5. Aircrack
  6. Metasploit
  7. WireShark
  8. Nessus
  9. Nikto
  10. BeEF
  11. Ettercap
  12. Kali Linux
  13. Intruder
  14. Burp Suite
  15. W3AF
  16. SQLmap
  17. Invicti (previously Netsparker)

Staffbase

What is Staffbase?

Uniting companies and their staff behind a common purpose is a big Management task. Staff base automates this through a simple to use yet efficient communications app and platform. Staff base allows the employees to reach out and engage across every channel

Who uses Staffbase?

According to Staff base, more than 2000 companies use Staffbase communications platform and unifies communication of more than 2 million employees.

What Services do WNPL provide for the Staffbase Platform?

WNPL works with business to develop plugins and integrations to the Staffbase platform. WNPL team delivers this through consultation, business analysis, architecting, development, implementation, maintenance and support of plugins and custom integrations.

What is Staffbase marketplace?

Staffbase marketplace is an online platform that allows software Technology Partners of Staffbase to publish Plugins and extensions to the Staffbase platform. Customers of Staffbase can browse such third-party products, plugins and services.

Zero Day Attacks

What is a zero-day attack?

  • Hackers can use vulnerability of a computer system or software, which only the vendor can fix. Since those vulnerabilities were not previously known to even the vendor, the system is open and vulnerable to hackers until it is fixed.
  • In short, Zero-day attacks are targeted on the flaws or holes in security of a software that exists from the beginning of the recent version of the software. Such errors could be because of the incorr3ect configurations, errors in programming, etc.
  • To minimise Zero-day attacks, it is important that the latest patches of software systems are applied on time and a very reliable connection is made with all software vendors.

Who are targeted in zero-day exploits?

  1. Government and quasi government organisations.
  2. Medium to Large enterprises.
  3. Individuals who have access to high value business data (e.g.: Intellectual property, Scientific innovation information, Business Information, etc.)

What is an example of a zero-day attack?

  1. Stuxnet: The zero-day vulnerability of programmable logic controllers were attacked which affected manufacturing processes of many countries
  2. RSA: Vulnerability in Adobe Flash Player was used to gain access to the network of a company.
  3. Sony zero-day attack: Though exact details are still unknown, the attack cause major havoc to Sony's network.

Zero trust

What is zero trust?

Zero Trust is a cyber security framework that requires all users to be authenticated. That is, all users who are inside or outside the organisation are considered untrusted until granted permission. Therefore, they need to be continuously validated for security after they are authenticated and authorized.

Zero trust aims to address the challenges faced by today’s business in securing cloud infrastructure, 3rd party business transactions, in-office workers, on-field workers and casual as well as work from home users. Zero trust architecture, sometimes known as perimeter less security, addresses this challenge trusting no one and nothing. That is, the Zero trust solutions should be capable of: “Never trust, always verify” and “treat every data flow, user, application, workload, device, network as untrusted”.

What are the Core Principles of the Zero Trust Model?

  1. Zero trust users
  2. Zero trust devices
  3. Zero trust networks
  4. Zero trust workloads/ applications
  5. Zero trust dataflow

Custom AI/ML and Operational Efficiency development for large enterprises and small/medium businesses.
Request free consultation
1300 633 225

Request free consultation

Free consultation and technical feasibility assessment.
×

Trusted by

Copyright © 2024 WNPL. All rights reserved.