Home Business Software APIs are the key to integration

The growth in SaaS adoption is driving "a growing need for integration with existing applications and systems", both cloud to cloud and cloud to on-premises.

"It's becoming all about APIs," Oracle vice-president of product management and strategy for Oracle application integration Vikas Anand told iTWire.

APIs provide a way to deliver data services with a good user experience to mobile devices, they create new revenue opportunities, they help build new applications, and they improve operational efficiency.

"A good API solves 50% of the integration," he observed.

Another area where APIs are "very important" is process automation, as there is a need for human workflows to handle any exceptions that arise.

Furthermore, there's the move towards developing applications to run on platforms-as-a-service in order to more easily take advantage of technologies including machine learning and blockchain.

But there are some bottlenecks.

Cultural changes may be required to promote the adoption of Agile, scrum, and related approaches. But this is already being addressed as companies realise the value of following best practices, and digital teams (as opposed to traditional IT staff) are often taking the lead in this regard.

Processes around changes need to become more nimble.

While security can be a bottleneck, there is increased awareness that cloud can be secure, but it is necessary to check that providers have the right certifications and so on.

Sectors in the API vanguard include retail, telecoms, and some parts of the finance industry. They have "definitely done much better than other sectors", said Anand, but others — notably manufacturing — are ramping up their efforts.

This isn't something IT organisations can afford to ignore.

APIs and modern supporting tools can make integration tasks much quicker. Anand cited a case where a project was completed in one-sixth the time and at one-eighth the cost of traditional approaches to integration.

API management can help with design, security and monetisation, he observed.

Integration projects often involve legacy applications that do not expose APIs, Anand warned. However, robotic process automation can bridge these two worlds.


It's YOW's 10th anniversary this year and we would like to celebrate with you. YOW! proudly invites you to join us at Celebrating 10 years of YOW! – Dinner with Speakers.

An intimate networking experience, YOW! Dinner with Speakers offers attendees the opportunity to gain industry and career insights on a more personal level with YOW! speakers from the 2018 conference.

An intimate networking experience, YOW! Dinner with Speakers offers attendees the opportunity to gain industry and career insights on a more personal level with YOW! speakers from the 2018 conference.

Book a table of 10, bring a friend, or come by yourself and make new friends!

Register now for YOW! Dinner with Speakers:

· Sydney on Thursday November 29
· Brisbane on Tuesday December 3
· Melbourne on Thursday December 6



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware attacks on businesses and institutions are now the most common type of malware breach, accounting for 39% of all IT security incidents, and they are still growing.

Criminal ransomware revenues are projected to reach $11.5B by 2019.

With a few simple policies and procedures, plus some cutting-edge endpoint countermeasures, you can effectively protect your business from the ransomware menace.


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.


Popular News




Sponsored News