Business Applications

Robust, flexible and maintainable

We understand the unique needs of B2B companies when it comes to software development. That's why we specialize in building custom B2B applications that are designed to support your business processes, improve efficiency, and drive growth.

Business applications often become complex and need to adapt to changing business requirements. Our solutions focus on robustness, flexibility and maintainability for the business and performance, ease-of-use and accountability for users. We provice outstanding software engineering abilities coupled with seasoned product management and user interface/experience designers. This makes Dekkode your one-stop-shop for your next business software project.

Business software often have a long life expectancy, so maintainability is a key requirement. Corporate compliance and policies can drastically increase scope and slow down innovation. That’s why Dekkode developed the ADLER framework. A robust set of enterprise-ready components that accelerates development and time-to-market and still covering all enterprise needs.

User Auth & User Management

Effective user management is essential for any business application. At Dekkode, we understand the importance of security and ease-of-management when it comes to handling medium-to-large user bases. That's why we specialize in building robust, fast, and user-friendly user management systems that meet the needs of both end-users and administrators.

Our user management systems include a range of features designed to ensure security and convenience, including:

  • Safe passwords and encryption: We use strict encryption to protect your user data, both in storage and in transit.

  • Single-Sign-On: We support Single-Sign-On using technologies like Saml (Office 365, Exchange, LDAP) to make it easier for users to access your application.

  • Two-Factor Authentication: We offer Two-Factor Authentication options to add an extra layer of security to your user management system.

  • Authorization: Our user management systems include flexible authorization controls to ensure that users have the appropriate access to the features and resources they need.

  • Fine-Grained permission controls: We offer fine-grained permission controls to give you granular control over user access to specific resources and features.

  • Role-Based permissions: We support Role-Based permissions to make it easier to manage access for large groups of users.

  • Import/Export: Our user management systems include tools for importing and exporting user data, making it easy to manage large user bases.

  • Audit Trail: We provide an audit trail to help you track user activity and ensure compliance.

API Integrations

APIs are an essential part of modern software development, allowing applications to share data with each other and third-party services. At Dekkode, we have extensive experience building and integrating APIs for a wide range of purposes and technologies.

Our API integration services include:

  • Integration with legacy systems and existing APIs: We can help you connect your applications to older systems or integrate with third-party APIs.

  • Providing REST APIs: We specialize in building REST APIs that are independent from your internal data model, performant, and secure.

  • Third-party APIs: We have experience integrating with popular APIs like SAP, Office 365, Teams, and Slack, as well as custom applications.

  • Import/Export: We support a range of import/export formats, including CSV, XML, REST, and SOAP, to make it easy to transfer data between systems.

Whether you need to connect your applications to legacy systems, expose data to third parties, or simply make it easier to share data between your own applications, we have the expertise and tools to help. Contact us today to learn more about how we can support your API integration needs.

Security

Information security is a very important issue in today's world. Information security is the security of information in computer and telecommunications networks. This security involves protecting electronic data from theft or damage to the hardware, as well as from unauthorized modification, disclosure, or destruction.

Security cannot be done on-top of an existing application. It has to be an integral part during design, development and maintenance in the full software lifecycle. The inital threat model is the very first starting point that helps you find risks, take action against them and create a secure architecture.

Penetration tests should be performed regularly, but is never a replacement for continuous monitoring and both software and hardware maintenance.

What we did

  • Cloud Security Baselines
  • AI trained firewalls
  • Infrastructure Hardening
  • Logging
  • Firewalls, NAT, VPCs
  • Fine-Grained security permissions
  • Daily security updates
  • Regular OS updates
  • Identity and Access Management
  • Web Application Security
  • - Secure Coding
  • - Penetration Testing
  • - Secure Cloud Backup Storage
  • - Identity and Access Management
  • - Secure Backup Storage

GDPR & Compliance

The laws of the European Union, and the GDPR in particular, are intended to protect the rights of data subjects and ensure that the processing of data is performed in a lawful, fair and transparent manner. The GDPR applies to all companies processing and/or holding the personal data of data subjects living in the European Union, regardless of the company’s location.

We believe that privacy is a fundamental right and that no one should be deprived of their data. That’s why we build our software from the ground up with privacy at the core of the design. In practice, this means we ensure that privacy is built into all stages of the development process and embedded as a key part of our technology. Privacy is always taken into consideration when making decisions about what to build and how to build it.

The most  relevant rights for data subjects are:

  • The right to be informed: informing users with a clear privacy notice
  • The right of access: exporting all data of a data subject
  • The right to erasure: search for a data subject and delete some or all their data.
  • The right to rectification: you can search for a data subject and delete some or all their data.
  • The right to object: let your users easily opt-out on your privacy policy page.

 

Application Performance

Developing high-performant applications, is not about styling, or any other superficial aspects. It's really about understanding the fundamentals of an application, and how it behaves when it has to deal with a high load, or when there are too many requests to handle. It means understanding and understanding how an application is wired, and what happens to all of its components when they are loaded. It also means understanding how a web browser works, so that you don't waste time trying to make it do something it cannot do. Performance is always the result of a complex interaction between hard- and software. You have to build the right foundations, and then you have to carefully lay the bricks of your application. In the end, if you do it right, you'll end up with a nice looking, clean, and fast application.
 

  • Overloaded server
  • Database request too slow to execute or poorly written
  • Slow Web request.
  • Slow Browser Rendering
  • Slow application code execution.
  • DNS and network performance issue

How do we ensure that Applications are fast?

  • Autoscaling infrastructure
    • CDNs, Caching, Database and Application Containers
  • Application Design for performance
    • Delegate heavy work to Asynchronous workers
    • Optimize Database Queries
    • Optimize I/O
    • Use caching where applicable
  • Frontend / Browser Rendering Performance
    • Snappy Applications and User Interfaces
    • Avoid Repaints with modern CSS
    • reduce network requests and network bandwidth by optimizing assets,
    • Avoid heavy JavaScript operations on the client
  • Application Performance Monitoring
    • Detect slow requests and ensure bottlenecks are found and individually fixed

Business Applications in Hamburg!

Reach out and learn how we can help you

Accessibility

10 Million pairs of glasses are sold every year in Germany, about 600.000 people in Germany are visual impaired (RKI). Ten thousands of people have limited movement and cognitive abilities, many more suffer from temporary symptoms. Making applications accessible to anybody is essential for anyone creating high-quality products and not to exclude people from using your product and services.

The W3C created a large set of guidelines we follow to ensure our products are inclusive. This is not just the right thing to do or a luxury add-on. It also helps every user.

  • Keyboard navigation
  • Support for different screen sizes and zoom factors
  • Screen readers, writing accessible html markup
  • Text-Transcriptions of video and audio content
  • Follow WCAG guidelines

Reporting

Reporting is essential in most B2B applications. We developed a wide range of reporting and analytics tools, from simple excel reports, integrating existing third party services to full-powered analytics solutions handling millions of rows in seconds. It's common to make interactive dashboards, generate PDF and Excel exports and offer a rich set of filter and sorting features.

 

Reporting for executive management Reporting for internal and external auditors Reporting for finance and accounting Reporting for inventory

  • Custom reporting solutions
    • TimeSeries Reporting, Scheduled Email Reports, Ad-Hoc Reporting
  • Reporting databases
    • Optimized for heavy reporting on large datasets
  • Integrate third party reporting solutions, such as Tableau or Quicksight

Search

Search is the process of finding information one is looking for. Today, users are used to fast, complete and intelligent search based on the search engines they are using on the world wide web. Many business applications deliver a poor search experience, since search is often seen as an “add-on” to the classical hierarchical navigation. In reality, search is one of the most convenient and powerful ways user interact with an application – if done right.

 

Fast and Smart
Search results should be visible instantly in the best case, but must never take longer than 1 second. This performance is only possible if the application is built for search, e.g. by using a dedicated full-text search engine such as ElasticSearch. It must be tolerant against typos, search for synonyms and offer suggestions to the end user. Results must ranked properly, and link directly to the according views inside the application.

What we did with Search:

  • Extensive search functionality, search services
  • Extracting text from pdfs, excel sheets, websites and images
  • Facetted search, allowing to combine filters and free-text search

Business Applications in Hamburg!

Reach out and learn how we can help you

Other Services

© 2024 - Made by Dekkode GmbH