A Guide to REST and API Design
A How-to Guide to OAuth & API Security
What is a Process-Based Application?
Develop a 1st Business Process Application with Bonita BPM 6
The example application is developed with Bonita BPM 6 Teamwork Subscription Edition. This paper also gives some pointers to develop it with Bonita BPM 6 Community Edition.
The Ultimate Guide to BPMN2
Mitigating Mobile App Risk to Ensure Safe, Reliable Deployments
SOLVING FOR “TOTAL COST” IN THE CLOUD
This paper shows you how to calculate the total cost of migrating applications to the cloud, including obvious hardware costs as well as the human costs of managing apps in the cloud.
Have you factored in these costs?
• Training related to new skills, tools, and processes
• Server CPU, memory, storage, and monitoring
• VPN and direct connect fees
• Need for additional cloud administrators
• Cost of moving data to the cloud
2014 Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, Europe
Read the full report for an in-depth analysis of the European market for cloud-enabled managed hosting and the vendors to watch out for.
CloudHarmony CenturyLink Hyperscale Testing Report
After running a variety of benchmarks over a long period of time (to ensure that the test gave an accurate look over an extended window), they shared their findings with the world.
5 Pillars of API Management
A How-to Guide to OAuth & API Security
Choosing the Right API Management Solution for the Enterprise User
Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).
5 OAuth Essentials for API Access Control
Five Simple Strategies for Securing APIs
APIs are the technology behind this approach. APIs allow developers to create an open architecture for sharing functionality and data between applications. APIs are like windows into an application—a direct conduit that leads straight into the core functionality and data residing in the heart of the app.