Security and scalability without lock-in

Security and scalability without lock-in

Security and scalability without lock-in The adoption of our no-code application development platform by enterprises has accelerated on a world-wide scale. With WEM, business-critical software can be created in no-time. Without having to write a single line of code....

Authentication Providers

User Authentication Most of the times an application requires users to log onto the system. That means the application needs user management and users need to authenticate themselves and need to be authorized to access the application. To do this you have two options:...

Remote Data Sources

Remote data sources are used to access the database of another system, through the OData protocol. OData (Open Data protocol) “Open Data Protocol (OData) is an open protocol which allows the creation and consumption of queryable and interoperable RESTful APIs in...

Realtime Messages

The Realtime messages functionality is used to allow an application to send messages. That means there is always a sender and a receiver/listener. These are created using Realtime Messages flowchart nodes. A sender sends a messages through a particular message chanel,...

 +31 (0)20 240 21 20       

Videos and images courtesy of WEM Modeler. © 2019. WEM Modeler.
SitemapPrivacy - Terms - Company

 +31 (0)20 240 21 20       


Videos and images courtesy of WEM Modeler.
© 2019 WEM Modeler.
SitemapPrivacy - Terms - Company