While crime rates in the UK have dropped by more than 20%, cybercrime seems to be on the rise. Phishing related attacks are up by a staggering 667% compared to pre-pandemic February, and more than £2M has been reported lost by victims of Coronavirus-related scams. Despite common belief, not all cybercriminals are technology wizards who spend their days in a basement hacking into government servers. Some use simple tricks and social engineering, which hardly require technical expertise.
If you read my previous blog post on competing in the API economy, you probably have a feel for just how important APIs are for modern organisations. Implementing an API strategy unlocks internal assets and makes you a competitive and relevant force in our diverse and fast-changing tech landscape.
There is still much confusion about the differences and commonalities between SOA (service-oriented architecture), microservices, APIs and, even, point-to-point integration.
The pom.xml file contains the core information about a project and its configuration details including its dependencies, build directory, source directory, test source directory, plugin, goals etc. Maven reads the pom.xml file, then executes the goal.
Notifications could be a very powerful tool to get visibility into business-related events inside your application.
MuleSoft has exposed an API that provides access to Anypoint MQ administrative functionality. For those who are not familiar with Anypoint MQ, it's a multi-tenant, cloud messaging service that enables customers to perform advanced asynchronous messaging scenarios between their applications. Using this API you can perform a series of actions that otherwise would only be accessible through the Anypoint Platform's web interface. And since many organisations prefer to externalise and automate this type of processes using scripts, I would like to explain how to use all four basic CRUD methods (Create, Read, Update and Delete) using this API.
Are post-it's enough?
Recently a few of our team members attended Celonis SuperFluid Tour in London, where we found that post-it notes and a whiteboard are still one of their biggest competitors. Celonis, for those unaware, offer a solution, powered by process mining technology that empowers companies to visualise their processes, thus providing insights to which of these can be improved. It can come as a surprise, that in the age of digital transformation, many organisations are satisfied with getting the room's opinion during a whiteboard and/or post-it note session as the best process discovery technique.
Recently, one of our customers requested to consume RPC-style web services built on top of a legacy system. Unfortunately, I then discovered that RPC WSDL were not supported by the Web Service Consumer connector in Mule 4. Want to know the solution?
At Infomentum we have successfully moved towards a centralised logged infrastructure where systems, application, network and security logs are parsed and made available in one central point. Using components such as Elasticsearch, Logstash and Kibana, our logging infrastructure provides us the ability to apply filters to perform queries and basic trends analysis or counts.
One of the challenges we faced was shipping Windows Server logs from a logfile onto Logstash’s syslog listener, and we found a tool that does exactly that - nxlog-ce-2.9.1716
Due to the popularity of our previous blog 'Get the most out of Oracle APEX logs' published in January 2018 we decided to continue the Oracle APEX series. Rene Mikami is back with more amazing Oracle APEX suggestions and tips!