A technical brief for Crane Worldwide Logistics IT leadership. Written for engineers and architects evaluating WakeTech.ai against shared-codebase SaaS alternatives.
Modern cloud-native TMS vendors operate on a single multi-tenant codebase where every customer runs identical software against a logically-separated slice of a shared database. The vendor philosophy is one codebase, no customization, configuration only.
This model is efficient for the vendor and appropriate for customers whose operations fit inside the vendor opinionated workflow. It fails when a customer organization cannot be represented by the vendor data model. Enterprises with hierarchical sub-divisions, federated regional offices, multiple legal entities, or industry-specific workflows that fall outside the vendor core assumptions hit a ceiling that no amount of configuration can break through.
WakeTech.ai operates on a hybrid architecture that preserves the engineering discipline of a single canonical platform while giving each enterprise customer the isolation, customization flexibility, and data sovereignty they need. The model has four components.
All WakeTech.ai customers run the same platform at the same version. Core is a single canonical codebase maintained by the WakeTech.ai engineering team. Core improvements, security patches, and new features propagate to every customer on a regular release cadence. No customer modifies core. No customer runs a forked version of core. This discipline is what lets us maintain high development velocity, predictable quality, and defensible security posture as we scale.
Each enterprise customer receives a dedicated deployment of the WakeTech.ai platform. Dedicated means:
Customer-specific behavior lives in a dedicated customization layer that sits alongside core, never inside core. The customization layer is where the enterprise value lives for large customers. It contains:
The line between shared core and customer customization is enforced by engineering discipline, not convention. Core publishes a versioned extension API and commits to backward compatibility within a major version. Customization layers depend only on the published API, never on core internals. Core and customization layers deploy independently. The core test suite runs without any customer extensions loaded. Customization test suites run against a known core version and alert on incompatibility before production.
You own your data. Every row, every file, every log. Stored in your database, in your deployment, under your control. Portable on request.
You own your customizations. The extension layer code that represents your specific business processes belongs to you. If you ever leave WakeTech.ai, you take it with you. If you want to maintain it with your own engineering team, you can.
You do not own the core platform. WakeTech.ai owns and maintains the shared core, which is licensed to you as part of your deployment. You benefit from every core improvement we ship for every customer. You are never responsible for maintaining core yourself. This is the trade: shared core gives you leverage, the customization layer gives you control, and the dedicated deployment gives you isolation.
You are not a tenant in someone else database. Your data never mixes with another customer data. Your performance is not affected by another customer workload. Your security posture is not coupled to another customer security posture.
You can customize without forking. Unlike vendors who publicly state they do not allow customization, WakeTech.ai treats customization as a first-class product capability. When your workflow does not fit the core defaults, we extend your customization layer, not core, and your specific needs become a maintained part of your deployment without compromising the shared platform other customers depend on.
When an enterprise customer funds a new capability, WakeTech.ai evaluates whether it belongs in shared core or in the customer customization layer. The decision is based on generality, not who paid.
Broadly useful capabilities (hierarchical division modeling, multi-currency support, enhanced customs documentation) become part of shared core. Every WakeTech.ai customer eventually benefits. The funding customer gets the feature first, gets implementation priority, and gets recognition. Pricing reflects that the capability will be amortized across the platform.
Customer-specific capabilities (a particular legacy ERP integration, an internal GL code mapping, a proprietary carrier scoring algorithm, a specific compliance workflow unique to the customer business) live in the customer customization layer. They are built to the customer specification, maintained as part of the customer deployment, and do not appear in any other customer environment. Pricing reflects that the cost is not amortized.
This policy protects the integrity of the shared core while ensuring every customer gets genuine customization value.
| Component | Maintained by |
|---|---|
| Shared core platform code | Wake Tech |
| Core security patches and vulnerability response | Wake Tech |
| Core performance optimization | Wake Tech |
| New core features that benefit all customers | Wake Tech |
| Customer-specific customization layer code | Wake Tech delivered, customer owned |
| Customer database contents | Customer |
| Customer integrations to external systems | Wake Tech built, customer owned |
| Customer configuration of core settings | Customer |
| Deployment infrastructure (VMs, databases, networking) | Wake Tech or customer, depending on deployment model |
| Deployment upgrades and core version management | Wake Tech, on a schedule coordinated with customer change management |
WakeTech.ai architecture refuses the false choice between rigid multi-tenant SaaS and forking the codebase per customer. The shared rigid core preserves platform quality and development velocity. The dedicated per-customer deployment preserves isolation, data sovereignty, and compliance posture. The customization layer preserves the customer ability to model their actual organization and integrate their actual systems without compromising the core or affecting other customers.
For an enterprise customer whose organization cannot be represented by a vendor opinionated data model, or whose compliance posture cannot tolerate a shared database, this architecture is the only one that works at scale.