How does one go about securing APIs, microservices, and websites? One way to do this is by focusing on the identity — knowing who the caller is, and what the caller is allowed to do with your data. Too often, though, providers rely too heavily on user social identity, pairing it way too closely with the design of their APIs. Read more
The advent of cloud computing has changed the way applications are being built, deployed and hosted. One important development in recent years has been the emergence of DevOps — a discipline at the crossroads between application development and system administration.
Empowered developers have been given a wide new set of tools to enable:
- Application lifecycle management with continuous integration software like Jenkins, Travis CI, CircleCI, and CodeShip;
- Server provisioning with software and metadata using configuration management tools like Chef, Puppet, Salt, and Ansible;
- Hosting applications in the cloud, whether they use an IaaS provider like Amazon Web Services, Google Compute Engine, or Digital Ocean, or a PaaS solution like Heroku, Google App Engine, or any technology-specific offering.
Unlike diamonds, information systems (IS) are not forever. As a company evolves, its IS evolves too. This evolution is induced by a company’s business and organizational transformations, regulation modifications and/or technical revolutions. In this Lego computing age, evolving an information system often means aggregating existing brick products instead of building them to create value. Read more
In an age where thousands of devices interact with microservices and API-driven servers, an API gateway can act as a single entry point to internal architecture — a popular choice for developers as it increases security, improves user experience, and helps ecosystems thrive. Read more