article thumbnail

My API story: Vodafone's API Architecture Guild

TM Forum

Florin Tene, Enterprise Architect, Vodafone Group, explains how and why Vodafone dedicates people, processes, guidelines, and tools to increase and support the adoption, usage, and development of TM Forum's industry-standard Open APIs as part of its 'telco to tech' evolution. Tell us about yourself and your job. TMF629 - Customer management.

article thumbnail

Cloud native order management boosts speed, scale and operational efficiency

TM Forum

HT’s architecture adhered to the Forum’s guidelines on integration, data management, applications’ architecture, transition architecture and more, plus best practices for cloud-native IT development and deployment, and patterns for use. (also known as TAM or GB929) was used to map applications.

Cloud 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

ODA components garner growing industry support

TM Forum

” Gustavo Jerónimo Ochovo, DevOps & Cloud Architect at Alvatross by SATEC, cites the involvement of major CSPs such as Orange, Vodafone and Telefónica in defining ODA as one of the reasons he believes it will be the “de facto standard in the digital services business.” ” The aim of.

Industry 130
article thumbnail

Secure platforms as a service allow you to focus on function

Network World

Even though larger cloud providers offer security and implementation guidelines, companies still face significant risks and challenges when deploying secure applications to the cloud. These companies boast elite security and DevOps teams that work to secure their products and write new features.

article thumbnail

Broadcom Software Shows How the Cyber Defence Centre Will Help in 2022

CIO Business Intelligence

Indeed, despite the increased attention to corporate security, common vulnerabilities still leave most corporate networks open to breaches. But with a framework providing a guideline to build their security capabilities, organizations can be confident that they’re conducting their SOC transformation around a common framework.

article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In the T-Mobile case, Lapsus$ members hacked into T-Mobile’s network in March 2022 by compromising employee accounts, either via phishing or another form of social engineering. Prepare containment and mitigation strategies and guidelines for events during (or after) an attack.

article thumbnail

Technology Short Take #86

Scott Lowe

Networking. I found the articles at step 5, the benefits of Git for network engineers , but the previous four articles also look helpful. Do I need to talk about how understanding a service mesh is a good thing for networking professionals? That might be a good blog post topic right there!). Servers/Hardware.