Web Application Methodologies

Web Application Methodologies

We have been using the "Agile" software development methodology coined in 2001 from as early as 1998 which went against all traditional methodologies current at the time. This method is a sensible low risk approach that is both fast and flexible that suits development of projects of all sizes as we have successfully demonstrated. This approach ensures we design systems to customer's requirements involving customers in the design and all aspects of system development. It increases customer awareness in the development of web applications and gives customers control over their applications. Projects are divided into manageable phases and implemented as scheduled. The final result is a high quality web application, rich in functionality with many unique features to choose from our web development toolkit.

Website Architecture

Leaders in architecture of mainframe and corporate software, our natural progression was development of web applications. We use a three-tier architecture - the user interface displaying static or dynamic content rendered by your web browser, business application objects defining processes and system functionality and a data layer controlling the retrieval and storage of data from the database. This modular approach provides flexiblity and scalability required for efficient development, growth and effective maintenance.

Web Applications are constructed using HTML, javascript and server side script with object orientated classes. Web applications send and receive requests from your internet browser to a central web server. Web servers can be configured on either a Linux platform running PHP server side script or on a Windows platform running a .NET framework.

Website security

In addition to security on the firewall and web servers, we provide 256 bit encryption via an SSL Security Server Certificate over the internet.

Sensitive information stored on databases is encrypted using AES RIJNDAEL encryption.

Strong type 6 character passwords are encrypted with 1 way RSA MD5 Security algorithm. Logons are disabled after too many failed attempts to prevent unauthorised access to web applications. User profiles give specific functionality defining access to menus, reports or various functions. A user with unlimited access has full control over users and what they can do in the web application.

Workflow and Audit

We use eAdmin® Workflow System to keep track of outstanding tasks and work requested by our customers. The workflow system is effectively like an electronic in-tray where you can create a task and then assign it to someone's in-tray to complete the job. An email is sent automatically alerting the recipient that the work is sitting in their in-tray. We can also set up access for our customers so that they can create tasks, contribute to existing tasks or to track the progress of their tasks. This provides an accurate audit trail for which tasks were assigned to whom, what issues were involved and when tasks were completed etc.

Database Management

Databases are used when large volumes of data need to be displayed or processed or for sophisticated web applications. A database might also be used for a smaller website such as where one page can be used to display any number of products.

Kennedy Fox takes care of all facets of the database including creation, maintenance, backups and restores when required. Moving to a new web application invariably requires one or more data conversions and we take care of these for you as well.

Search Engine Optimisation (SEO) of Web Applications

Search engine optimisation for web applications is different from websites in the public domain. The front end pages for web applications can be search engine optimised if you want to attract visitors to the application. The actual web application pages are usually exempt from search engine optimisation.