Out of the Weeds and into Product: APIs and the Future of Data Science

August 25 2016

0 comments 95
data science resize

Today’s post is from Sean McClureSean is the Director of Data Science at Space-Time Insight, a leading provider of advanced analytics software for organizations looking to leverage machine learning for their business applications. Having worked across diverse industries, and alongside many talented professionals, Sean has seen the blend of approaches required to convert raw data successfully into real world value. Sean’s passion is working with cross-discipline teams to build the next generation of adaptive, data-driven applications.

Don’t do IT like the roads in Istanbul

August 22 2016

1 comment. 21
Traffic jam

A recent trip to Istanbul got me thinking about enterprise IT architecture. Seriously! If you’ve ever been to Istanbul, you’ll know that it’s a fast-growing, vibrant, and dynamic city. Unfortunately, the roads can also be very congested at times, taking hours to get from one side of the megacity to the other.

API security: Ways to authenticate and authorize

API Security- Authentication and Authorization

This post will be part 1 of 3 for my ultimate guide to API security best practices series. In this post, I will be discussing the current concerns IT decision makers have in regards to their current digital assets.

Part 2 will address the need for keeping data private and protecting it from being compromised while making it accessible at all times.

HowTo – Report analytics from Mule Runtime using Splunk

Report Analytics from Mule Runtime using Splunk

MuleSoft Anypoint Runtime Manager (ARM) provides connectivity to Mule Runtime engines deployed across your organization to provide centralized management, monitoring and analytics reporting. However, most enterprise customers find it necessary for these on-premises runtimes to integrate with their existing monitoring systems such as Splunk and ELK to support a single pane of glass view across the infrastructure.

anypoint runtime manager

How much is an API worth?

How much is api worth

Last updated August 8, 2016 Have you been wondering how much an API would cost if you put a dollar figure on it? That’s been an important question especially for investors since many startups now offer APIs as their core product. We found an interesting way to calculate the value of an API, but by no means is it the end all be all equation.

Webinar: MuleSoft Best Practices – How to Get the Most out of Anypoint

August 9 2016

0 comments 7
MuleSoft best practices webinar banner

What do you most want to know about MuleSoft? Join us for this MuleSoft best practices webinar and become one step closer to becoming an expert user.

Obviously, we’re big fans of Anypoint Platform here at MuleSoft, but we know that it takes a bit of training to get started. We often hear questions from people who are new to Anypoint Platform and from people who have been using it for a while about best practices, the right way to do things, etc.

Guest blogging for MuleSoft

August 5 2016

1 comment. 22
MuleSoft Guest Blog

We get requests from time to time about guest blogging at MuleSoft. Here is an official post about it if you are interested in submitting a guest post.

Should you guest blog? 

Of course! You have valuable insights and content and we want to help you share that information with others.

Some benefits include:

  • Thousands of readers will get to read and interact with your ideas

Future of FinTech depends on APIs

fintech api

Investors around the world in 2015 invested a total of $19.1 billion in the fintech industry.

Annual-Global-Fintech-Trend-2015-CB-Insights-KPMG

It is not surprising considering the level of disruption in the financial industry; retail banks, traditional lenders, and traditional asset managers have all seen digital disruption. Over the past few years, we have seen explosive growth in online versions of those traditional services listed above with online only banks, peer to peer lending platforms, and robo-advisors.

Webinar: CIOs and CISOs – Enable Security By Design

Security by design webinar banner

Learn how to align security and agility

In some organizations, the Chief Information Security Officer (CISO) has earned a reputation inside of IT as a blocker or a hindrance to innovation.  Some CISOs have even be referred to as the ‘Queen (or King) of No.’  Why?  Because despite the massive amounts of attention being paid to security in the media, with Target, Apple, Nissan, and Twitter all making the news recently for their security failures, security is still considered an afterthought in most IT projects.  As a result, by the time security professionals get involved in project delivery, they have no choice but to flag security gaps that often require impractical redesign — resulting in project delays at best and cancellation at worst.

Are you an API expert? Take our quiz and find out!

MuleSoft API expert quiz

Application program interfaces (APIs) have become extremely valuable to hugely successful companies such as Facebook, Twilio, and Expedia. They are, in fact, a strategic investment for any business. You can offer your APIs as your entire business, have your APIs become part of your core business, or even use other companies’ APIs to build your business – you get the idea.