Blogs

Our blogs boost knowledge sharing, provide insight into best practice software development and look at the latest technology trends.

Selected Tag: Mendix

Mendix low-code fundamentals – applying application security

Liam Kearns 16th Jan 2024

Looking to ensure secure application development? Episode 3 of our Mendix Fundamentals Series describes how security rules can be applied and helps you understand the basic security principles within the Mendix low-code application development environment.

Read More

Mendix low-code fundamentals – building the pages of your application

Scott Walker 30th Nov 2023

Episode 2 features Mendix developer Luca Santese demonstrating how to build Pages and create an engaging front-end for your Mendix low-code application!

Read More

Mendix low-code fundamentals – creating the domain model

Hannelore Elsden 30th Oct 2023

Our new Mendix Fundamentals Series contains explanations and walkthroughs of some of the key concepts used in the Mendix low-code development platform. Across the four-part series, AuraQ’s team of experienced Mendix developers will cover the essential features required to build an effective Mendix application including the domain model, pages, security and microflows.

Read More

Leveraging machine learning capabilities in application development

Liam Kearns 28th Sep 2023

In recent years, the digital sector has been transformed by artificial intelligence (AI). With tools such as ChatGPT and DALL-E, public access to AI resources is at an all-time high.

Read More

Git integration in Mendix

Jarnail Singh 31st Jul 2023

Mendix has chosen Git as their standard for version control going forwards. Explore some of the differences between using Git and SVN and walk through how developers use Git version control when creating both new applications and when converting existing Mendix applications.

Read More

5 ways in which Mendix supports cyber security principles

Liam Kearns 27th Apr 2023

During development, it is crucial to be security conscious to reduce the risk of vulnerabilities existing at the point of deployment. This can be a particularly daunting task when developing with programming languages, where insecure coding practices can result in breaches through vulnerabilities such as SQL injection and buffer overflows.

Read More

Get in touch to talk about your project or technology needs.

Develop. Integrate. Transform.

Drag