Systems | Development | Analytics | API | Testing

October 2024

Rapid B2B Integrations With Ballerina and Choreo

Many business processes involve communicating with external parties such as suppliers, logistics providers, insurance providers, and government institutions. Unlike internal communications, these inter-organizational communications usually have to follow various regulations and standards, and could introduce delays if one party doesn’t comply. Therefore, effective business-to-business (B2B) integrations are a key part of most digital transformation projects.

Post-Quantum Hybrid Encryption with Ballerina

As highlighted in the Quantum-Safeness of WSO2 Products blog, there is an urgent need for alternative asymmetric encryption methods. Post-quantum algorithms (Q) are gradually gaining prominence but require time to establish trust within the industry. Therefore, combining classical (C) and post-quantum (Q) Key Encapsulation Mechanisms (KEMs) ensures resilience against classical and quantum attacks. The Ballerina Swan Lake Update 9 release adds support for post-quantum secure end-to-end encryption.

Developing Agile ETL Flows with Ballerina

Organizations generate vast amounts of data daily during various business operations. For example, whenever a customer checks out out at a retail outlet, data such as the customer identifier, retail outlet identifier, time of check out, list of purchased items, and the total sales value can be captured in the Point of Sales (PoS) system. Similarly, field sales staff may record possible sales opportunities in spreadsheets.

The Five Pillars of Customer Identity and Access Management #WordsUnplugged

Customer Identity and Access Management (CIAM), a subgenre of IAM, enables organizations to scale and ensure secure, seamless digital experiences for their customers, while collecting and managing customer identity data purposefully. Powerful CIAM solutions provide a variety of key features including customer registration, social logins, account verification, self-service account management, consent and preference management, single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication as well as other nice-to-have features.
Featured Post

The Five Critical Pillars of Customer Identity and Access Management

In today's interconnected digital landscape, effective management of customer identities is not just a technical requirement but a strategic asset. Customer identity and access management (CIAM) systems are at the heart of this, ensuring secure and seamless user experiences across numerous digital interfaces. Whether for individual consumers or business clients, CIAM facilitates personalised interactions while safeguarding sensitive data, complying with global regulations, and improving business enablement and operational efficiency.

EP12: Crafting the Digital Modernization Roadmap for Architects

In this episode, Sanjiva and Asanka explore the evolving landscape of digital modernization. They discuss how modernization is not a one-time project but an ongoing journey, transitioning from digital transformation to digital modernization. The conversation delves into various modernization styles, such as rehosting, replatforming, rebuilding, and replacing, and addresses challenges like cost, skills, and organizational resistance. They also highlight the role of platforms and AI in accelerating modernization, with a focus on cost savings, risk reduction, and business agility.