What can we do for you?
Telefónica is going digital and to do so it needs to connect its backend systems with mobile apps, partners, cloud services and global solutions. But Telefonica is a multi-local business and its systems differ depending on the country.
Perceptiva is helping Telefónica to achieve that goal in Uruguay by implementing Axway technology that enables the standardization and management of an API layer that exposes these capabilities in a seamless way.
Read our interview with Alvaro Fernandez - Head of the Office of Project Management (PMO) and Datawarehouse at Telefónica Uruguay to understand how we are working together to empower their digital business.
"In the "economy of experience", where consumers expect hyper-personalization of products and services and ubiquitous access to them. You must participate pro-actively with those involved in each process connected in all physical and virtual channels, to offer personalized and instant data and services. PERCEPTIVA offers everything digital businesses need to design and implement a strategy, quickly build impressive applications for a wide variety of platforms, unlock internal back-end data and associated services needed to bring new and improved experiences in all channels, analyze information in real time to measure success, work collaboratively and conduct your business based on continuous improvement.
A nonprofit Belgian company, provided a new, API-centric platform to modernize the Belgium government’s data architecture and leverage new technologies and security protocols while offering greater efficiency and cost-effectiveness. The main objective is to work actively and in a manner that is sustainable for the future.
Making the decision to leave his position at Google to head up Axway’s Catalyst team, Brian Pagano wasn’t certain how much of a culture shock he would experience in his new adventure. But Brian says his transition to Axway has been a terrific experience all around.
API portals give APIs a home whether you’re only looking for internal users to reach them. Since APIs are the medium to build great experiences, the portal design, when set to inspire, models great experiences for those consuming them. Offering tangible shop windows and welcome signs to business users and anyone looking at your API to decide if its right for them encourages adoption. A welcome community, then is the key to a healthy and thriving API ecosystem, especially if you’re looking to attract platform adoption. We see this adoption shift enterprise software through the interaction of open source communities who not only monetized their inventions but also created a great place for technology to live.
The theme of #BetterTogether holds strong with Axway this year. This was the theme behind this year’s internal kickoffs as well as our big IMAGINE SUMMIT customer events. This theme ties our organization together and embraces our customers, partners and staff for a greater potential than we can achieve alone. Further, this theme naturally aligns with and is behind the premise of a hybrid integration platform strategy. There are too many facets of #BetterTogether in talking hybrid integration platforms to fully unpack in this note; you can get cues in this blog post about hybrid integration platforms.
In 2011, DoSomething.org, a non-profit organization, posted a video on YouTube featuring celebrities asking young people to donate used sports equipment to youth in need. That video was viewed by 1.5 million people. Success, you might think? Well, only eight viewers signed up to donate. Of those eight, none actually donated.
Watch this video to learn how to secure an API in AMPLIFY Central using an API key as an example. You’ll learn how to apply an API key client authentication policy to an API, create an app to manage access to the API, and deploy and test the secured API.
The integration platform as a service (iPaaS) market is not just growing, it is accelerating. iPaaS is a cloud service that provides a platform to support applications that involve a combination of data sources, cloud-based applications and others.
Axway and Microsoft share a special “Gold partnership” bond that brings many benefits to both companies.
Watch this video to learn how to register an API as an API proxy in AMPLIFY Central using the Star Wars API as an example. You’ll learn how to import a Swagger (OpenAPI) definition for an API, create an API proxy for the API, and deploy and test the proxy both in AMPLIFY Central and Postman.
This video is part of the Get started with AMPLIFY Central series. This series demonstrates the API management capabilities of AMPLIFY Central and is ideal for new users.
API Management – and specifically event-driven architecture (EDA) – is a critical piece of a hybrid integration platform (HIP). Event-driven API management continues to gain importance due to the growth in deployment of solutions that create or leverage “events” including IoT, blockchain, mobile and microservices.
IMAGINE SUMMIT Europe in Chantilly, France was a smashing success. Over 200 exhibitors and customers took part in the two-day summit. From learning labs to keynotes on the main stage to hands-on demos, Axway pulled out all the stops to make the event a memorable one.
Perceptiva was duly represented, as its CEO, Ricardo Zengin, participated and had the opportuniy to network, learn, and have fun.
MVD Fintech Forum brings together both public and private associates to the Fintech sector. Its aim is to encourage the sector´s development, interchanging expierences and better practices that help create a global market without borders.
Working in the open source industry is a very rewarding career move, especially since the future of it looks bright. With statistics showing more companies are going to rely on open source applications in the future to save money buying commercial products, job openings will become tremendous.
Many of the software products that everyone uses are open source. The Linux operating system, the Apache Web server, and a large number of software development systems are all open-source software. Their being open source is one of the reasons they’re so widely used. They’re more stable, more accessible to public view, and more trusted than they would be as unpublished proprietary code.
If nothing else, the recent hack of Equifax that compromised approximately 143 million American credit records is a signal that even our most trusted networks are vulnerable.
However, security breaches are almost always the result of an exploitation of a simple vulnerability. The best firewalls in the world can’t stand up to valid credentials. In fact, there is emerging evidence that perhaps the Equifax breach was the result of an easy-to-guess password.
Software applications are used both in homes and workplaces. Web and mobile apps are used for communication. They help businesses and individuals get updates on the latest trends and happenings.
One of the obstacles any static analysis tool encounters is the ease with which developers can manage defects that are not pertinent to their development. Oftentimes these “defects” for whatever reason simply do not apply. The most known case of such defects is false positives.
Application security is no longer an afterthought. Developers now prioritize security due to the exponential risk of cybercrime. Developers need to pay more attention to security as it is a crucial aspect of app development. Using application security solutions like Kiuwan ensures that vulnerabilities can be identified and resolved in good time. Popular solutions like Static Application Security Testing (SAST) simultaneously used with Source Code Analysis (SCA) ensures that commonly found vulnerabilities are identified for a secure Software Development Life Cycle (SDLC). Comprehensive integration for web and mobile applications in Swift allows individual developers as well as leading application development organizations to abate sophisticated malware. SCA is the most efficient and comprehensive means of identifying loopholes, ensuring that applications are protected. Every IT organization should have SAST as a mandatory requirement for the development and production of applications.
Cybercrime is an ever-evolving world of constant change as cybercriminals continue to develop increasingly dangerous and sophisticated attacks. In particular, data breaches plagued dozens of well-known organizations around the world in 2018, with the single largest attack affecting marketing firm Exactis. Fortunately, while the tactics used by cybercriminals are constantly changing, the field of cybersecurity is also constantly evolving to meet the challenges posed by the latest cyber threats. This means that 2019 and 2020 will likely represent a time of continual change for the field of cybersecurity, which can make it difficult to know what we can expect to happen in the coming months. However, based on current trends, we can make predictions about likely events and trends that will take place in cybersecurity in the coming year. Here are 6 predictions for trends and activities we believe will take place in the cybersecurity landscape in 2019.
Open source software is good for your business since it allows you the freedom to modify it, so it meets all your company requirements. Aside from excellent security, the software is also cost effective since you don’t have to worry about overpaying to use readily available software. Security tools like Kiuwan ensure that open source software and applications built on them are secure and fully-functional. Below are five main benefits of open source solutions.
As IT security frictions grow and increased regulation consistently looms on the horizon, businesses need a change. Traditional security practices simply don’t work in today’s rapid development environment. To keep pace with competitors, you have to push out apps faster and more aggressively, while attempting to increase collaboration throughout your entire cycle. This DevOps approach to the software development life cycle (SDLC) has become the answer to the speed and scale needed to succeed in today’s environment. But, what about security?
DevSecOps involves baking security into the DevOps practice. To be clear, DevSecOps isn’t a tool or a strategy or a process; it’s a marriage of all three. Instead of simply handing off security elements to a security team at the end of the dev lifecycle, DevSecOps involves hinging security to the entire app framework by introducing it early, collaboratively, and rapidly.
Why is this important?
Before starting a new physical activity, a health check is always a good idea, to see if you are in good shape to meet your goals. It is the same for your organization and your operational excellence initiative. A check-up of your process health is essential, but just like exercising, it can be tough to get started. Here are a few suggestions on how to proceed!
Around the Easter holidays is a great time to get your team together, delve into your organization's business processes, and do a little process optimization. Before you hop to it, read on to find what you need to consider, and how Signavio can help make sure you don't end up with egg on your face.
Your culture needs to be customer-first, but more importantly, it needs to be action oriented
Too often, people - and businesses! - are unwilling to admit to a gap in knowledge, and much more likely to move forward blindly hoping that ignoring an issue will make it slowly disappear. But there is a better way! Read on to find out how you can use process mining to capture the value in your process mistakes, and turn those mistakes into strengths.
A positive customer experience means more than excellent customer service. Think of it as examining your customers under a magnifying glass, making sure you focus on what your customers actually want and need, then working out the best way to provide it to them. Read on to discover more about how customer journey mapping can help, and how Signavio works to provide a positive customer experience for our own customers.
Dr. Gero Decker, Mark McGregor, and Jim Sinur estimate that the market for software and services to support Customer Excellence will exceed $100bn inside two years, and may rise to as much as $300bn within five years. Discover why…
The automotive space in 2019 is one of the world's most innovative industries, as well as a critical ‘driver’ of the economy. Such is its significance that the economic ripple effects can dictate slumps and spark growth, whilst supporting a vast supply chain and generating a spectrum of business services. In fact, according to the heavyweight European Automobile Manufacturers Association, the automotive industry is the largest private investor in R&D in Europe, with almost €54 billion invested annually.
In his predictions for the year ahead, Signavio Co-founder and CEO Dr. Gero Decker argued that stand-alone Process Mining will be set to disappear in 2019, or at the very least, be replaced and upgraded to something slightly more actionable: Business Process Discovery.
Are you thinking big enough? Understanding the benefits of process mining and transparency can revolutionize business by offering the information, visibility, and quantifiable numbers needed to improve processes. But how do we turbocharge our skill set, network, and understanding? Signavio hosted ‘Berlin Process Mining’ to share current industry experiences and insights, for 24-karat improvement…
Many company-wide RPA (robotic process automation) deployments start small, perhaps put in place to help run a discrete project, or remove some of the more mundane repetitive activities that human staff are finding irksome in a single department.
The benefits usually become clear very rapidly and, often with the help of a newly-converted advocate of the technology, the organisation tries to spread RPA across the enterprise, hoping for the same transformation everywhere.
Many think of this as digital transformation (or a significant part of it), but in contrast to the claims made by some RPA suppliers, rapidly deploying cheap robots across the company doesn’t create cost savings and efficiency gains to the extent that is desired.
© 2018 All Rights Reserved