It’s All About the App: Mobile Security That Helps Enable the Business

Mobility is taking today’s world by storm. By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe. Understandably, the pressure to deliver diverse apps to external and internal audiences is felt universally across every enterprise.
Get Whitepaper

Transforming Digital Business with APIs

The app, in many digital forms, mobile, cloud and the Internet of Things, has created the opportunity for enterprises to optimize interaction with employees, customers and business partners in fundamentally new ways. Choosing the right digital platform can be the difference between success and failure.
Get Whitepaper

5 Pillars of API Management

Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Get Whitepaper

A How-to Guide to OAuth & API Security

OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Get Whitepaper

What is a Process-Based Application?

Companies today need to move from a functional model to a process‐oriented model, allowing them to be more flexible and proactive to changes in their environment. Current information systems and processes rarely correspond to a transparent, cross border organization. On the contrary, these information systems replicate and reinforce the classical and functional organizational structure, where each business unit has its own applications and data silos. This of course leads to inefficiencies due to redundancy of data in different systems.
Get Whitepaper

Common Pitfalls in Process Optimization

Process optimization is “the discipline of adjusting a process so as to optimize some specified set of parameters without violating some constraint” and should always links back to the heart of the business strategy. The optimization efforts should strengthen the reason of existence of a company, and lead to cost minimization, output maximization, or both.

There are 5 common pitfalls to avoid when engaging in process optimization:

1. Unclear start and finish of the process optimization project

2. Using the wrong key performance indicators

3. Lack of ownership and support throughout the organization

4. Not embedding process changes

5. Lack of execution Edition.

Get Whitepaper

Develop a 1st Business Process Application with Bonita BPM 6

Whether you are wondering how BPMN can significantly improve the efficiency of your daily operations or whether you are wondering how to turn an existing process into an optimized dynamic application, this paper addresses these challenges through a concrete business example: the modeling and the automation of an employee leave management procedure. We have put ourselves in the shoes of a project team engaged in the development of its first BPMN implementation.

The example application is developed with Bonita BPM 6 Teamwork Subscription Edition. This paper also gives some pointers to develop it with Bonita BPM 6 Community Edition.

Get Whitepaper

The Ultimate Guide to BPMN2

We realize that many people and organizations who could benefit from BPMN have yet to give it a try. It may be that you’ve been putting it off under the mistaken assumption that you need to be an expert to use BPMN. Or it may be because the standard itself, and many of the things written about BPMN, are bit unwieldy and hard to dissect.
Get Whitepaper

CloudHarmony CenturyLink Hyperscale Testing Report

The independent testing results are in, and CenturyLink Cloud’s Hyperscale cloud compute instances are the ones to beat for key performance measures and total cost of ownership. With the launch of our new Hyperscale server instances, we approached an independent analytics company, CloudHarmony, and asked them to conduct an extended performance test that compared CenturyLink Cloud Hyperscale servers to the best of breed equivalent servers offered by AWS & Rackspace. CloudHarmony is a well-respected shop that collects data from dozens of benchmarks & shares the results publicly for anyone to dissect.

After running a variety of benchmarks over a long period of time (to ensure that the test gave an accurate look over an extended window), they shared their findings with the world.

Get Whitepaper

5 Pillars of API Management

Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Get Whitepaper

Case Study SteelHead Schneider Electric

Riverbed Technology is working with Schneider Electric to ensure the success of its IT transformation, providing products that ensure fast and reliable, global data access for all employees over the corporate network and the Internet. Read this whitepaper to learn more.
Get Whitepaper

Choosing the Right API Management Solution for the Enterprise User

The application programming interface (API) may be an old concept but it is one that is undergoing a transformation as, driven by mobile and cloud requirements, more and more organizations are opening their information assets to external developers.

Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).

Get Whitepaper

Securing Edge Data at the Center

Nobody can afford to lose data. But managing data, including backup and availability, in far-flung locations can present many logistical and technological challenges that bring complexity, expense, and risk. It doesn't have to be that way though.
Get Whitepaper

5 OAuth Essentials for API Access Control

OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Get Whitepaper