{"id":"07c361f4-0721-476c-b0a5-ee97df342f4a","timestamp":1776175165783,"matcher":{"static":{},"wildcard":{},"dynamic":{}},"prerendered":["/blog/5-security-risks-small-businesses-overlook","/blog/when-systems-stop-working-is-it-the-software-or-how-it-fits-together","/blog/how-can-i-use-ai-in-my-business","/blog/how-to-reduce-admin-time-in-a-small-business-without-creating-problems","/blog/why-your-teams-avoid-using-your-software","/blog/why-security-shouldnt-be-an-afterthought-in-your-software","/blog/is-your-software-the-problem-how-to-find-out","/blog/when-to-call-an-e-commerce-website-development-agency-to-level-up-your-e-commerce-operations","/blog","/blog/tag/about","/blog/how-to-deliver-e-commerce-excellence","/blog/tag/business","/blog/tag/cloufdlare","/blog/tag/crm","/blog/tag/ai-agents","/blog/tag/ai-implementation","/blog/tag/branding","/blog/tag/cloudflare","/blog/tag/business-process-review","/blog/tag/data-protection","/blog/tag/change-management","/blog/tag/es6","/blog/tag/expo","/blog/tag/festive","/blog/tag/business-automation","/blog/tag/adasd","/blog/tag/charity","/blog/tag/ai-for-business","/blog/tag/bus","/blog/tag/fast","/blog/tag/business-risk-management","/blog/tag/company","/blog/tag/halloween","/blog/tag/custom-software-development","/blog/tag/hallo","/blog/tag/environment","/blog/tag/eco-friendly","/blog/tag/cyber-security-for-smes","/blog/tag/it-risk","/blog/tag/javascript","/blog/tag/jquery","/blog/tag/js","/blog/tag/marketing","/blog/tag/long-term-scalability","/blog/tag/our-story","/blog/tag/networking","/blog/tag/operational-efficiency","/blog/tag/purple-angels","/blog/tag/operational-resilience","/blog/tag/php","/blog/tag/pr","/blog/tag/sadsad","/blog/tag/process-improvement","/blog/tag/pumpkin","/blog/tag/risk-reduction","/blog/tag/secure-software-development","/blog/tag/sme-compliance","/blog/tag/seasonal","/blog/tag/sme-operations","/blog/tag/sme-productivity","/blog/tag/sme-software","/blog/tag/sme-technology-strategy","/blog/tag/software-architecture","/blog/tag/soft","/blog/tag/software","/blog/tag/software-adoption","/blog/tag/software-audit","/blog/tag/software-security","/blog/tag/speakers","/blog/tag/static-site","/blog/tag/spooky","/blog/tag/status-page","/","/about-us","/our-services","/contact-us","/our-work","/faqs","/legal","/blog/tag/system-design","/legal/cookie-policy","/legal/eula","/legal/privacy-policy","/blog/tag/user-adoption-challenges","/case-studies/agpm","/blog/tag/system-integration","/blog/tag/user-experience","/blog/tag/ux","/case-studies/jinfo","/case-studies/netwise","/case-studies/pharmakey","/legal/company-details","/legal/terms-conditions","/case-studies/country-cow-designs","/products/muddy-booking","/blog/tag/webperformance","/blog/tag/web-design","/blog/tag/web-development","/blog/tag/web-performance","/blog/tag/websites","/blog/tag/webinar","/blog/tag/workflow-optimization","/blog/tag/website","/blog/tag/workflow-optimisation"]}