The modular monolith architecture means that we provide one solution with noticeable module boundaries resulting from the business values of the activity whose needs the software addresses. This means that we try to sustainably granulate software into modules that can be individually scaled over time, can use separate data resources, have their own integrations, and can even be completely interchangeable. Thanks to communication based on an external bus, they remain independent and mutually reliable, which additionally increases the comfort of using the solution and facilitates integration with third-party solutions.
For communication between the frontend and backend, we use two protocols - connectionless HTTP with REST architecture and connection WebSockets. The first technology works very well when downloading and sending large portions of data. The second allows us to provide solutions whose content changes in real time and the transmitted content is minimized to only the necessary data. Thanks to this, the solutions can respond in real time to changing data and react in various situations, e.g. lack of access to the network and server.
The internet solution offers unlimited integration possibilities. Server-side software can communicate with third-party solutions, ranging from local, existing software to cloud solutions and services from companies such as Google, Amazon and Microsoft.
The backend of our web applications can run on virtually any hardware platform. All thanks to the .NET platform, which is available both for native Microsoft systems - Windows and Windows Server, but also for Linux/Unix and macOS platforms. Additionally, we enclose solutions in containers and can scale them in two dimensions - lengthwise and widthwise. Without any special programming intervention - just like that.
User and data security is the most important feature of software that anyone who wants to avoid problems should pay attention to. The use of integrated two-step authentication, integration with external credential centers using OAuth or OpenID, and finally authorization using Google/Microsoft/Facebook/Apple accounts. End-to-end encryption of communication, storing data in encrypted containers are just some of the solutions we use. Our web applications have repeatedly undergone very rigorous security audits carried out using the "ethical hacking" model, and no serious vulnerabilities threatening the security of data, organizations or users have ever been detected.
The technological world is developing very dynamically, all thanks to the changing environment and user expectations. We have identified the following technologies as outdated for many different reasons - they do not meet security standards, they are not supported and developed by their creators, they are not transferable or they are not as efficient as newer solutions. Thanks to the fact that in the past we have developed software in the following technologies, we can offer their support and maintenance, and as part of the development, migration to newer solutions, indicated above.
Our primary goal is not so much to provide software, but to actually address the needs and solve problems of our customers. Before we start creating a vision of the software's functionality together, we will conduct a deep analysis to reveal the needs. We will then prioritize them based on business values. We will also look for paths to optimize the operation of your business processes, not only from the perspective of the software itself.
For us, the key value in working with non-technology-savvy clients is to bring them as close to technology as possible. That's why we devote a lot of time and attention to carefully explaining each stage of the software development process. We also provide advice so that design decisions are fully conscious and based on understandable values.
Many clients are afraid of disclosing the budget at the early stage of the project, believing that it will negatively affect the valuation of the project. This is the most common mistake and cause of frustration in the software development process. Really defining the budget allows you to look at functional needs from many perspectives. Being aware of the limited budget, we can look for more economical solutions that may not be fully satisfactory, but at this stage they will address the needs and will be sufficient. As the business value of the entire project increases, these areas may be developed, but this does not have to happen immediately. There are several proven solutions that allow for controlled budget management - we will present them and help you with this task as soon as we get to know each other.
This is one of the most common concerns that arises at the early stage of talks about implementing a new project. In short: no. An agile approach to a project does not preclude setting clear goals and points on the timeline that are to be achieved. However, frequent and small design iterations allow you to obtain the desired functionalities faster with a reduced budget. The combination of lean development with continuous validation of requirements and assumptions perfectly verifies the previous needs analysis. In fact, the analysis progresses with the development of the project and naturally optimizes its scope by limiting unnecessary steps.
If our portfolio is not enough of an argument, we will be happy to present technological possibilities and talk about the challenges we have encountered over the years of working on other projects and how we found solutions to seemingly unsolvable problems.
In communication with clients, we focus primarily on honesty, openness and transparency. This allows you to avoid understatements while building lasting, mutual trust.
We look at each project on two scales - micro and macro. On a macro scale, we define milestones for modules and functional areas that we want to achieve in specific order and points on the project timeline. On a micro scale, we manage tasks in iterations no longer than 2 weeks, so we have full control over the implementation stage and can dynamically respond to emerging threats by e.g. increasing internal resources.
Implementation is not the last stage of the software development cycle at aveneo. We help with user training and training. We are the best partner for this because we know all the design assumptions and full mechanics of the delivered solution. This will guarantee satisfaction and understanding of the solution, and will also allow you to collect conclusions from users regarding potential optimizations and new functionalities.
For large projects, it is difficult to bring all stakeholders together at every meeting. It is completely natural for different departments to have mutually exclusive expectations. Our role is to collect all the needs and design a solution that will take into account all business processes and reconcile those that stand in opposition to each other into a coherent and logical whole.
This is completely normal! Every investment carries some risk. Depending on the source of the concern, additional levels of security should be implemented. For our part, we will try to find tools that will help you get rid of stress and guarantee the success of the project. For example, if concerns concern the functional scope, we suggest identifying the most valuable functionalities and building a small section of the software, and then validating the assumptions and checking in a real environment whether the solution is satisfactory.