All Resources

Eat your microservices elephant one bite at a time

There seems to be a tendency amongst architects to think of microservices as a way to build entire applications, taking monoliths and completely re-implementing them as a set of microservices. This belief makes a lot of architects, especially in large enterprise, question whether microservices is right for their organization.

However, there’s another way to look at this that allows you to "eat your microservices elephant one bite at a time."

Continue Reading Here

API essentials for every stakeholder

APIs, by virtue of their openness and utility, tend to touch many areas of an IT organization. As a result, API success usually means devising an API strategy that will serve the diverse needs of people in various roles who rely on them. The right tooling for API design and management are essential to ensure that all roles feel served by the API strategy. This can be as much an organizational issue as a technical one.

This paper reviews some of the key players who have a stake in API strategy, including API designers, integration developers, API product managers, operations leads, security architects, and enterprise architects. It looks at how an API platform (or platforms) can address the distinctive needs of each role as they come to devise and implement an API strategy.

Continue Reading Here

Key findings from the Global State of API Security survey 2015

The front lines of information security risk management evolve in parallel with the dominant technologies in common use. The emergence of the web brought web-based threats and resulting countermeasures. The rise of SQL databases brought SQL injection and its mitigations. Now, we have the increasing usage and business importance of application programming interfaces (APIs), which are vital the development of mobile applications and the digital enterprise in general. APIs, like all technologies, have security vulnerabilities. In fact, the very openness that makes them so useful in expanding the enterprise into the digital realm can itself be an avenue of risk exposure.

Continue Reading Here

Displaying results 1-10 (of 44)
 |<  < 1 - 2 - 3 - 4 - 5  >  >| 
Category Tags
academic aerospace Akana case study Akana datasheet Akana Lifecycle Manager Akana Platform Akana video Akana white paper API analytics API development API Gateway API management API microservices API portal API security Apigility automotive brochure brochures case study CentOS cloud CodeDynamics CodeDynamics video coding standards continuous delivery continuous integration data sheet datasheet debugging developer productivity DevOps digital media dynamic analysis ecommerce Elixir energy & environment enterprise php Family finance government HostAccess how-to HydraExpress IBM i IBM WebSphere DataPower IMSL IMSL C Library IMSL Family IMSL Fortran Library IMSL Java Library IMSL NET Library infographic insurance JMSL JViews Klocwork language: c language: java legal & compliance license life sciences & healthcare M&A manufacturing MemoryScape MISRA mobile network and telecom equipment NoSQL OAuth OEM & ISV open banking open source Open Source Audit open source management open source support OpenLogic Other Industries php presentation product publishing PV-WAVE PyIMSL Studio Python real estate ReplayEngine research retail scanning & governance security Semantics Manager services SmartRank SOA software policy software quality software security software verification SOLA source code analysis SourcePro static analysis static code analysis Stingray Studio supply chain support support & services survey results telecom TotalView training transportation video Views Visualization web development white paper Zend Zend case study Zend datasheet Zend Framework Zend Guard Zend Server Zend Studio Zend video Zend white paper Z-Ray