Domain-driven design

M# follows a strict object-oriented structure using clean encapsulation of the data and behaviour in well-defined domain driven business entities.
Learn more »

Consistency & predictability

M# generates the target .NET code based on patterns and rules consistently. Once you learn one module, you'll know exactly how every other modules will have been implemented.
Learn more »

Elegance & style of code

Unlike most other compilers and code generators, M# has the developer in mind when emitting the target code.
Learn more »

Flexible User Interface

The UI layer in M# is based on cross-browser-compatible HTML and CSS. You can accommodate literally any graphic design.
Learn more »

Independence from M#

The generated .NET source code is self-sufficient and lacks any runtime dependency upon M#. That eliminates any risks usually associated to using cutting-edge technologies.
Learn more »

Minimal learning curve

It takes only a few hours for a .NET developer to learn the pattern of the .NET code generated by M#. The consistency  of the code will make everything obvious. 
Learn more »

Data access layer

Using a pluggable provider model, M# simplifies data access operations in the business logic layer through a high level Facade class.
Learn more »

Automated testing

M# generates unit tests and regression tests automatically for the generated code. It also facilitates writing tests for your custom code. 
Learn more »

Code documentation

XML code documentation is used throughout the generated code in line with best-practices recommended by StyleCop, Microsoft’s static source code analysis tool.
Learn more »

Performance & scalability

It is fully web-farm ready and supports scaling up as well as scaling out with a very efficient and economic use of hardware resources. In addition, powerful data caching options are provided out-of-the-box to boost performance.
Learn more »

Code security, authentication & authorisation

Applications generated by M# follow defensive code blocks and self-protect against all common security vulnerabilities including SQL Injection, Cross Site Scripting and Unauthorised data access.
Learn more »