Remove Authentication Remove Data Remove Document Remove Enterprise Systems
article thumbnail

3 commandments that should drive every API strategy

CIO Business Intelligence

We are now bringing this approach to the more monolithic enterprise systems.” For example, to ensure consistency, access control should be centrally managed, with one identification and authentication scheme to be used by all APIs. Data format should also be centrally managed to ensure uniformity.

Strategy 133
article thumbnail

Wallets and Agents

Phil Windley

Managing encrypted data interactions with the wallet. Backing up and retrieving data in the wallet. Maintaining relationships by communicating with other agents when DID documents are updated. Identity-related activities like authentication and credential exchange are built on top of these basic functions.

article thumbnail

PepsiCo IT redefines direct-to-store business model success

CIO Business Intelligence

Whether they are placing orders, making deliveries, or creating invoices, frontline employees need a dependable, feature-rich edge device that they can take into stores and reliably connect with key enterprise systems. A cloud-native backend with more than 100 interfaces was developed to support the data needs of the app.

Retail 96