Latest Content

[WSO2 Summit Sydney 2017] Digital Transformation for Risk Management and eCommerce Platform

in this session Rajeev examines how SAI Global, a leading provider of integrated risk management, digitally transformed their company and processes using WSO2.

[WSO2 Summit Sydney 2017] Embracing the Digital Economy: "Smashing Down the Barriers"

The Digital Business Council was established to transform the way Australians do business. This session provides insight into some of the key lessons learnt through a cross-sector digital transformation program involving multiple competitive organizations. It will describes their triumphs and challenges, with a specific focus on the crucial role of active communities and ongoing stakeholder engagement.

[WSO2 Summit Sydney 2017] How to Plan and Run your Digital Transformation

"Think big, act small" - It’s easy to develop a vision, but the path to achieve it from where you are right now often has many technical and non-technical barriers. Asanka will share his experiences as a consultant and evangelist of digital transformation, and discuss a practical implementation model using an iterative approach.

[WSO2 Summit Sydney 2017] Architecting a Digital Enterprise

Digital transformation requires alignment between business and IT for it to be effective and workable. However, in most organizations, technical and business requirements and their respective stakeholders are often imperfectly aligned. Business and technical leads working on a digital transformation project realize the challenges of creating a digital workspace comprised of proper processes, systems, and an efficient and productive workforce. In this session, Asanka will explore the business and technical architectures of the digital enterprise; he will discuss the reference architecture for each of these and explain how they can be defined to build your digital platform.

[WSO2 Summit Sydney 2017] Adapting to Change: An Overview of Successful Digital Businesses

Technology is reshaping the landscape of many industries, and it’s evolving at a rapid pace. While new businesses have already responded with novel products, services, and business models for interacting with their stakeholders, others established players are seeking to engage in digital transformation to remain competitive. The key, however, is to be able to adapt fast, now just technology strategies, but also core aspects of their cultures. In this session, Jonathan will discuss success stories of organizations across different business verticals, focusing on their vision, strategy, and how they addressed challenges along the way.

[WSO2 Summit Sydney 2017] Navigating the Digital Transformation Landscape

Digital businesses are reshaping the landscape of many industries with novel products, services, and business models. To thrive and remain competitive new businesses and established enterprises alike need to adapt both their technology strategies and core aspects of their cultures. In this talk Sanjiva reviews cultural factors, technology requirements, and proven strategies for driving an effective digital transformation initiative.

[Article] An Introduction to WSO2 IoT Architecture

WSO2 IoT Server is a comprehensive open source IoT platform that enables enterprises to manage their mobile and Internet of Things (IoT) devices. This article provides a detailed analysis of WSO2 IoT Server’s architecture and explains the capabilities offered in each layer.

[Article] WSO2 Enterprise Integrator - Mediation, Service and Data Integration Under the Same Roof

WSO2 Enterprise Integrator consists of a number of components that provide the features required for a complete integration use case. By having a single product with combined functionality, developers can learn and start using the product faster and cross features will be seamlessly integrated out-of-the-box. Message transformation, mediation, data services, and message brokering are some of the features that will be highlighted in this article.

[Blog Post] OAuth 2.0 Threat Landscapes

Not long ago — early one day in May, I got an email from a good friend of mine, which I didn't resist to open and check out what it was. He had shared a Google doc — and once I clicked on the link a suspicious screen appeared, asking me permission to read, delete, send and manage my emails. Why on the earth would ‘Google Docs’ ask permissions to access my emails? I really didn’t bother to see whether it’s the real Google Docs — or fake, but I didn’t proceed any further.

Pages