Systems | Development | Analytics | API | Testing

How to Identify Automation Opportunities in Order-to-Cash with Process Mining

Insurance companies, like those across many other industries, struggle with systemic issues brought on by disjointed, outdated core technologies. To help minimize the strain disconnected systems can cause, Appian invests in experts with years of first-hand experience to deliver digital solutions that can increase efficiency and improve the customer experience.

Easily Monetize Your APIs with Moesif Plus Chargebee

It’s always great to build something that makes money. The most successful businesses often find the easiest and most efficient ways to make money, while keeping costs and support to a minimum. After all, the best businesses and products are simply the ones that know how to build revenue. Many companies now look to monetizing their APIs as part of their overall monetization strategy. API monetization isn’t always easy though.

API Authentication: What Is It?

With cybercrime continuing to grow at an alarming rate and cybercriminals getting increasingly clever about how they get their hands on your precious data, API authentication is more important than ever. If you’ve ever logged into an app or website using your Facebook or Google account, then you’ve used API authentication. APIs are the backbone of the internet. They allow disparate systems and login pages to communicate, exchanging user data and triggering actions.

Predictable Code in Elixir: Expressions as Reducers and Macros

In the first part of this series on maintainable Elixir code, we started by applying rules for code predictability in our code design. We immediately saw an emerging pattern: a series of transformations on state. In this part, we'll explore this pattern further. We'll first learn how to write expressions as reducers. Then we'll use metaprogramming to make use of reducers and enforce code style seamlessly. Finishing up, we'll see an example where all the pieces fit together. Let's get going!

The Red Velvet Rope of Low-Code Data Security

Here at Appian we're really excited to have released our low-code data security feature earlier this year. If you're not sure what that is, you're in good company. Even our parents just look at us blankly before saying "that's nice, dear" and changing the subject. Someone who doesn't love us unconditionally might be more skeptical.

5 ways we make sure your data is safe on Bitrise - compliance, access control, encryption, and more

Some of the world's most security-conscious companies rely on Bitrise to build safely. This article is a summary of the most important security-related measures we take to make sure your sensitive data is always protected.

Elastic stack-based Analytics Integration with WSO2 Identity Server

WSO2 Identity Server is an API-driven open source IAM product designed to help you build effective CIAM solutions. ELK-based analytics solution is introduced to view the login and session-related analytics data. Three dashboard templates are provided by default: Auth dashboard, Session dashboard, and alert dashboard. The session dashboard includes statistics related to sessions that get created for different applications accessed via the WSO2 Identity Server. Auth dashboard includes statistics related to login attempts made via the WSO2 Identity Server. The Alert dashboard includes suspicious Login Alerts and Long session alerts.