Systems | Development | Analytics | API | Testing

Latest Posts

How B2B CIAM Solutions Give Your Business a Competitive Edge

In the digital age, we interact with countless applications, whether for personal, professional, or recreational purposes. Many of these applications appear consumer-oriented but are, in fact, business-to-business (B2B) applications. For example, when accessing healthcare services, payroll systems, or school management platforms, you are likely using applications where your provider (such as your GP or employer) is a business customer of a larger B2B application.

Mocking Your APIs in Minutes with Choreo

Do you have an open API specification that needs to be transformed into a functional mock server? With Choreo’s latest release, you can now use Prism Mock service components to mock your open API specifications. This is powered by Prism, an open source technology, allowing you to tap into Choreo’s robust functionalities, including API management, observability, DevOps, and more.

Empowering Enterprise GenAI Development with New Choreo Features

Choreo is a powerful internal developer platform (IDP) as a service built for enterprises, offering a comprehensive suite of tools for CI/CD, API management, DevOps, observability, and business insights. It provides an all-in-one solution for building, deploying, governing, and monitoring enterprise applications—eliminating the need for developers to build complex CI/CD workflows or set up custom platforms.

Rapid B2B Integrations With Ballerina and Choreo

Many business processes involve communicating with external parties such as suppliers, logistics providers, insurance providers, and government institutions. Unlike internal communications, these inter-organizational communications usually have to follow various regulations and standards, and could introduce delays if one party doesn’t comply. Therefore, effective business-to-business (B2B) integrations are a key part of most digital transformation projects.

Post-Quantum Hybrid Encryption with Ballerina

As highlighted in the Quantum-Safeness of WSO2 Products blog, there is an urgent need for alternative asymmetric encryption methods. Post-quantum algorithms (Q) are gradually gaining prominence but require time to establish trust within the industry. Therefore, combining classical (C) and post-quantum (Q) Key Encapsulation Mechanisms (KEMs) ensures resilience against classical and quantum attacks. The Ballerina Swan Lake Update 9 release adds support for post-quantum secure end-to-end encryption.

Developing Agile ETL Flows with Ballerina

Organizations generate vast amounts of data daily during various business operations. For example, whenever a customer checks out out at a retail outlet, data such as the customer identifier, retail outlet identifier, time of check out, list of purchased items, and the total sales value can be captured in the Point of Sales (PoS) system. Similarly, field sales staff may record possible sales opportunities in spreadsheets.
Featured Post

The Five Critical Pillars of Customer Identity and Access Management

In today's interconnected digital landscape, effective management of customer identities is not just a technical requirement but a strategic asset. Customer identity and access management (CIAM) systems are at the heart of this, ensuring secure and seamless user experiences across numerous digital interfaces. Whether for individual consumers or business clients, CIAM facilitates personalised interactions while safeguarding sensitive data, complying with global regulations, and improving business enablement and operational efficiency.