Consumer markets and companies linked to habitat loss for rare species in Brazil’s savannah

Image

Consumer markets and companies linked to habitat loss for rare species in Brazil’s savannah

Overseas consumer markets could be responsible for more than half of the impact of expanding soy production on rare species in one of the world’s most biodiverse regions, the Cerrado savannah in Brazil, according to a new article in the Proceedings of the National Academy of Sciences (PNAS).

The paper, “Linking global drivers of agricultural trade to on-the-ground impacts on biodiversity” calculates the share of this impact that attributable to consumers in different countries around the world. More than half (55%) of the impact is attributed to food and other products that are consumed outside Brazil, with 22% attributed to consumption in China and 15% to consumption in the European Union.

“Our findings underline that local biodiversity loss is a global problem,” said co-author Paz Durán of the Institute of Ecology and Biodiversity at Universidad Austral de Chile. “Although both companies and consumers are paying increasing attention to the environmental cost of products, the complex nature of international supply chains can result in connections between a product and its environmental footprint being lost.”

Lead author Jonathan Green, from Stockholm Environment Institute (SEI) at the University of York, says: “Our new method reveals specific links between consumer countries, traders, soy production and habitat loss. This kind of knowledge can be invaluable for helping companies and countries to source more sustainably and invest in less ecologically harmful agriculture.”

The Cerrado is home to 5% of the world’s species, but the wilderness is being converted rapidly, particularly for agriculture.

The international team of researchers looked at the impacts on more than 400 plant and animal species that are highly or exclusively dependent on Cerrado ecosystems (i.e. had at least 70% of the entire range within the Cerrado), as well as a handful of more “charismatic” non-endemic species, such as the Giant anteater (Myrmecophaga tridactyla).

The study found that 86% of the losses to the Giant anteater’s range in the Cerrado occurred in Mato Grosso state, driven particularly by the consumption of products containing “embedded” soy (see below) in Brazil, China and the EU. However, species even more dependent on the Cerrado such as Kaempfer’s woodpecker and the Blue-eyed ground dove (see below) are in an even more precarious situation.

The researchers also linked the impacts on Cerrado biodiversity to specific consumption patterns in consumer markets. The vast majority of soy reaches consumers “embedded” in other products – particularly in meat and dairy products from livestock given feed containing soy, which is favoured for its high protein content.

The new paper shows that in major European markets like Germany, the UK, Italy and the Netherlands, consumption of non-beef meat products (including pork, chicken and lamb) fed on Cerrado soy had a bigger impact on biodiversity than consumption of soy-fed beef products; around 30% of the impact was linked to “other meats”, compared to 10–12% for beef. However, globally the shares were roughly equal (at 14% and 13%, respectively). (Note that these figures include all meat from livestock fed on Cerrado soy, whether raised inside or outside Brazil.)

The main scientific breakthrough described in the paper is linking a model of international financial flows with a detailed subnational-level model of soy production and trade developed by the Trase initiative in order to link deforestation to final consumption. This allowed the authors to estimate species-by-species losses of suitable habitat to derive a measure of biodiversity impact that accounts for species-specific differences in range sizes, sensitivities to land-use change and historical habitat loss.

Co-author Andrew Balmford of Cambridge University said: “The most exciting advance in bringing together these sophisticated datasets and models is the level of accountability it makes possible: we can now start to see exactly which businesses and consumers are harming threatened species, where, how, and in unprecedented detail.”

Co-author and Trase Director Toby Gardner of SEI said: “These results show that it is possible to use existing datasets to see through the tangled web of global commerce, giving us the detailed information, we need to devise solutions. We hope this methodology will be extended to other agricultural commodities and ecosystems in the near future.”

The research team include researchers from the UK, Germany, Sweden, Switzerland, Denmark and Chile.

Read the open-access paper published in the Proceedings of the National Academy of Sciences (PNAS).

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY

5 Precautions for Your New Business Start-Up

Image

5 Precautions for Your New Business Start-Up

There can be a dozen and one things to consider when starting a new business – and that comes before you even have to think about how to get customers, how to keep customers, and how to get even more customers.

The foundations of a business are as important as the foundations of a house. If you get something wrong, everything could collapse further down the line. But, luckily, there have been many successful businesses operating and thriving before you, who have all helped lay the groundwork for exactly what you might need when starting a new business. Here are five of the most important things to consider.

Intellectual Property

Many people overlook the importance of intellectual property, especially if you feel your business is one that has a loose definition of intellectual property. However, increasingly, companies are finding processes they use to succeed in business being stolen by competitors. In the US, there are three ways to protect your intellectual property: patents, trademarks, and copyrights. Copyright protection is more relevant for things you have created e.g. books, music, films, etc. Patents give you a 20-year monopoly on using a process – one that is novel, useful and not-obvious, while trademarks refer to elements of your brand name e.g. Kentucky Fried Chicken. Look into these carefully if your line of work involves them in any way.

Terms and Conditions

The internet is a valuable breeding ground for business success, but it definitely has its pitfalls too. Whenever you conduct business online, it’s useful to have some terms and conditions available. These refer to the buying or products or services, and any special offers or competitions that might be run. Social media allows you to run many competitions across Facebook, Twitter, and Instagram, but these competitions need to be run with T&Cs in place and adjudicated fairly. For instance, breaking rules on Facebook competitions can leave you in Facebook’s bad books.  

Image

General Liability Insurance

Should something go wrong, you’ll want to make sure that you are protected – and that’s where general liability insurance comes in. When collecting general liability insurance quotes, it is important to consider that such insurance is mainly intended to protect third parties as well as you from anything that might go wrong. Should you not be protected with general liability insurance, your business could face serious trouble. This means that the basic risks that could affect a business are covered and that you are free to continue trading without any unnecessary worry over what might happen.  

 

Data Privacy

Data privacy is a huge deal in 2019 and beyond, especially with several states launching data privacy laws. As online businesses can’t determine if they will deal with data from people in these jurisdictions – or indeed those protected by GDPR – data privacy policies are important. Not only do data privacy policies show you as trustworthy to customers, but they mean that you are protected should anything go awry and any data leaks should occur. Having a privacy policy for website visits somewhere easy to find on your website is a key priority.

 
Health and Safety

Some businesses should take heed of health and safety regulations more than others. Ensure that everything that could go wrong from a health and safety standpoint is protected against. Some places even ensure desk workers are conducting safe desk practices (screens at the right height, strong back support on chairs). Some businesses will even need to ensure that employees have undertaken certain training and assessments. From food hygiene to handling chemicals to fire safety. These will help your business mitigate any issues that might arise.

 

These five precautions will help ensure your business is not just ready to trade but also that it’s protected on various levels, enabling you to focus on keeping your customers happy and your products appealing. 

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY

Healix International undertakes emergency evacuations in response to civil unrest in Chile

Image

Healix International undertakes emergency evacuations in response to civil unrest in Chile

It has been widely reported that protests in Chile have escalated into significant civil unrest, resulting in 18 dead and approx 5,000 arrests to-date. In response, international health and risk assistance business, Healix International has been working with a number of its clients to facilitate evacuations.

The protests began on Monday 14th October over an increase in metro fares but have since developed into a broader expression of discontent over the cost of living. Chile has one of the highest levels of income inequality in Latin America and the current movement has primarily been led by the working class and students. However, because much of the unrest has occurred in and around metro stations, many bystanders have been caught up in the violence too.

And whilst the increase in transport fares that triggered the unrest has since been rescinded, the security experts at Healix International believe it is highly unlikely this will quell unrest generally. On that basis, working with employees who have staff currently working in Chile, Healix International has been facilitating a number of evacuations.

It is also offering advice to workers and travellers who remain in Chile:

·         Avoid protests. Protests may arise in any location, but they should be detectable from a distance due to the protesters doing ‘cacerolazos’ which means banging pots and pans with a spoon to make a lot of noise.

·         Avoid all metro stations and bus stops. Use alternative transport, preferably a pre-booked driver, and allow additional time for journeys.

·         Maintain a flexible itinerary. Be aware that gatherings often occur spontaneously and deteriorate at short notice.

·         If a higher risk protest location is unavoidable, do not wear military style clothing or anything that could be mistaken for a uniform. Do not attempt to cross roadblocks. Know where all exits are.

·         If you are caught outside in the middle of a riot or unrest, do not appear to take sides or attempt to photograph or film events. Move out of the crowd and find the nearest building to seek refuge. Avoid drawing attention to yourself. Keep your head down and avoid confrontation.  Walk rather than run to avoid attracting attention.

·         If you are caught in the middle of a riot or unrest while in a vehicle: remain inside your vehicle unless it has become the focus of the protest and avoid major roads and anticipate roadblocks. Do not drive towards large crowds; you may become a target. If driving is likely to endanger your safety further, exit your vehicle, lock it and move to the nearest building and seek refuge.

·         Abide by curfew hours of 20h00 to 06h00 in Santiago; 18h00 to 06h00 in Valparaiso and Concepcion.

·         Abide by all directives issued by the security forces or authorities.

For more information about the security risks in Chile visit https://healix.com/sharing-knowledge-and-news/civil-unrest-chile-advice

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY

Sectigo and SPYRUS Partner to Combat Ransomware Attacks with Fully Automated Digital Identity Management

Image

Sectigo and SPYRUS Partner to Combat Ransomware Attacks with Fully Automated Digital Identity Management

Sectigo, the world’s largest commercial Certificate Authority (CA) and a provider of purpose-built and automated PKI management solutions, today announced a partnership with SPYRUS, a provider of cryptographic operating systems delivering the strongest protection for data in motion, at rest, and at work, to help universities and enterprises protect against ransomware attacks. By collaborating, Sectigo and SPYRUS ensure the confidentiality, integrity, and availability of sensitive data, enabling organizations to combat ransomware attacks.

“It is increasingly important for enterprises to manage and secure digital identities properly,” said Damon Kachur, Vice President, IoT Solutions, Sectigo. “The collaboration between Sectigo and SPYRUS combines purpose-built PKI solutions with cryptographic operating systems to fully automate digital identity management, helping to assure organizations that their sensitive data is protected from cybercriminals.”

Device identity, authentication, and access management are critical to ransomware prevention. The SPYRUS Rosetta™ Hardware “Root of Trust” product suite protects the private keys for Sectigo-provided device identity and encryption certificates to enable strong authentication and secure storage. Together, SPYRUS and Sectigo provide fully automated management of all digital identities, regardless of issuer, across use cases, such as banking and financial transactions, as well as computing and IoT device authentication, using modern industry standards.

Cybersecurity Ventures predicts that a new organization will fall victim to a ransomware attack every 11 seconds by 2021. A type of malware attack, ransomware is spread through malicious email attachments, infected software apps, and external storage devices. Public sector organizations are hit particularly hard by Ransomware attacks, which lock the data on a victim’s computer until a cybercriminal receives payment and returns access. For example, hacks of school districts and universities are causing cities to declare a state of emergency, and a recent ransomware attack on the Baltimore government cost the city $18.2 million.

Texas A&M University System Safeguards Research

“Given the openness of American society, particularly in academic and scientific communities, costly incidents of ransomware continue to grow. By partnering with Sectigo, we can comprehensively address the security challenges universities and enterprises face in managing digital identities,” explained Grant Evans, CEO, SPYRUS. “Our partnership with Sectigo enables enterprises across sectors to address device identity, authentication, and access to combat these attacks.”

The Texas A&M University System is deploying a model solution that will allow researchers in higher education to meet all of the requirements for Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, which is stipulated by the Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 in accordance with NIST SP 800-171.

Kevin R. Gamache, Ph.D., chief research security officer with The Texas A&M University System, anticipates the Root of Trust offered by SPYRUS Solutions—along with the automated PKI management and distributed revocation status—will protect the University System’s authentication, encryption keys and algorithms.

“We expect solutions offered by SPYRUS and Sectigo to help ensure strong authenticated data encryption that will protect universities’ intellectual property. This model will scale to assure that all university research is secured and compliant with DFARS,” said Dr. Gamache.

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY

Scania wins Truck of the Year Latin America 2020

Image

Scania wins Truck of the Year Latin America 2020

Scania’s new truck generation has been voted “Truck of the Year Latin America” for 2020. The selection was made by a jury of 15 commercial vehicle editors and specialist journalists from Brazil, Argentina, Chile and Peru. The award was presented at Fenatran, the largest transport trade show in Latin America.

“Since introducing Scania’s new truck generation in Latin America at the beginning  of this year, our customers here are showing exactly the same enthusiasm as earlier experienced in Europe,” says Christopher Podgorski, President and CEO of Scania Latin America. “The new trucks have proven to be outstanding, not least in fuel economy, thereby boosting both haulier economy and combatting climate change.”

Based on the same rules of the renowned International Truck of the Year, the Latin American award is presented for trucks introduced in the market over the past 12 months. The jury makes its decision on the basis of which truck that has contributed the most to road transport efficiency. Several important criteria are considered, including technological innovation, comfort, safety, driveability, fuel economy, environmental footprint and total operating economy.

The new generation Scania trucks previously won the International Truck of the Year for 2017 when introduced in Europe. Trucks from Scania, Volvo, Iveco and Volkswagen were the contenders in this the first Truck of the Year Latin America.

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY

The 2019 Technology Elite awards press release

Image

U.S. Business News Unveils the Technology Elite Awards 2019 Winners

United States, 2019 – U.S. Business News announces the winners of the Technology Elite Awards 2019

An emerging sector in Latin America, creating more than a million jobs across the USA and interwoven into the fabric of each of Canada’s main industries, the tech sector is the focus of U.S. Business News’s, Technology Elite Awards 2019.

For this award programme, U.S. Business News are showcasing the best companies in this vast industry. These firms are all offering their technical expertise, services and products, to the vast array of markets and sectors who rely upon these advancements technologies to make their own operations run more efficiently and competitively. This programme celebrates the visionaries of the digital technology, whether you develop software, manufacture cutting edge solutions or distribute the latest technology to local or global clients.

The Technology Elite Awards acknowledges the efforts of these pioneers and disruptors of modern technology, as well as those who have sustained excellence and exhibited long term dedication to their commitment to the development and advancements in technology.

Discussing their pride in these deserving winners and the success they have achieved over the past twelve months, Awards Coordinator commented: “This awards programme showcases companies and individuals from across the technology market. From emerging fields like artificial intelligence, IoT and clean tech, to the sectors on which we are interdependent such as agriculture, engineering, transport, energy, telecommunications and healthcare, we have some of the market’s best firms on show here. I am proud of all my winners and would like to wish them the best of luck for whatever the future has in store.”

All winners for the awards were the result of months of research and analysis from U.S. Business News’ dedicated awards team. As a result, each and every winner was chosen on merit only, and can take great pride from the fact that they were selected for their success.

To find out more about the best of the best in the technology market, please visit the U.S. Business News website (https://www.usbusiness-news.com/technology-elite-awards-2019 ) for a full winners’ list and a link to our winners’ supplement.

ENDS

NOTES TO EDITORS

About U.S. Business News Magazine

U.S. Business News is the definitive magazine for CEOs, top tier management and key decision makers across the US. Created to inform, entertain, influence, and shape the corporate conversation across the nation through high quality editorial, in-depth research and an experienced and dedicated network of advisers, U.S. Business News provides our readership with the most authoritative and current analysis of the major changes effecting the corporate landscape, and the latest deals and topical issues dominating the corporate universe.

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY

The Search for Quantum-Resistant Cryptography: Understanding the Future Landscape

Image

The Search for Quantum-Resistant Cryptography: Understanding the Future Landscape

Sectigo Announces a Broad Set of Resources to Educate the Cybersecurity Community About the Implications of Quantum Computing on PKI.

Quantum computing is set to transform the IT industry. This new computing architecture takes advantage of quantum mechanics to deliver capabilities beyond what traditional binary computing can achieve. However, these capabilities come at a cost. Once quantum computers reach a certain state of maturity, they are destined to render the cryptographic underpinnings of today’s digital systems insecure.

To help enterprises prepare for the implications of quantum computing, Sectigo, the world’s largest commercial Certificate Authority (CA) and a provider of purpose-built and automated PKI management solutions, has created a broad set of 15 educational resources for security industry professionals in the form of a whitepaper, podcast episodes and transcriptions, and articles.

By its nature, quantum computing is highly effective at factorizing numbers, which means quantum computers will be many orders of magnitude faster at the calculations necessary to break the RSA and ECC (Elliptic Curve Cryptography) encryption that underpins our digital systems today. This efficiency gain is so monumental that increasing the key sizes of these cryptographic schemes is not a viable solution. Rather, the world’s Public Key Infrastructure (PKI) systems will have to migrate to one or more new, quantum-resistant encryption algorithms before quantum computers break current encryption methods.

PKI is necessary for the secure operation of all the confidential and mission-critical digital processes in our global economy, including finance, commerce, communication, enterprise computing, transportation, defense, manufacturing, healthcare, government, and logistics. The impact of insecure PKI would be so vast that this potential outcome has come to be known as the Quantum Apocalypse.


The Search for Algorithms is Underway

Thought leaders from industry, academia, and government are combining efforts to discover and deploy quantum-resistant cryptographic solutions across our global digital systems. The National Institute for Standards and Technology (NIST) has been leading an effort to identify one or more cryptographic approaches that can substitute for RSA and ECC. The community participating in NIST’s process now has a list of more than 20 candidate algorithms that are undergoing scrutiny of their suitability for this task.

Successful quantum-resistant algorithms must be difficult to break using brute-force attacks by both traditional and quantum architectures while still meeting performance standards similar to today’s algorithms. To be viable for widespread use, the algorithm must deliver on criteria such as:

– Fast encryption using traditional computers
– Fast decryption (with private keys) using traditional computers
– Impractical to decrypt (without private keys) using quantum or traditional computing architectures
– Able to generate encrypted data of a size that is reasonable for storage and transmission across networks and the internet
– Compatible with a vast range of software, hardware, and services
– Well-understood and checked against potential attacks


Understanding the Challenge – Available Resources

“While no one can definitively say when quantum computers will reach the point of defeating RSA and ECC, many estimates place that date in the next 10 or 15 years. Any organization that does not migrate by then will be vulnerable,” said Tim Callan, Senior Fellow, Sectigo.

“At Sectigo, we are working with our large base of enterprises, schools, and government agencies to help them achieve crypto agility by putting in place the systems and automation capabilities necessary to ensure rapid and comprehensive migration to these new standards once they arrive.”

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY

Haldex streamlines the manufacturing of brake adjusters

Image

Haldex streamlines the manufacturing of brake adjusters

Move of production from US to Mexico.

Commercialvehicle brake and suspension manufacturers Haldex will continue to streamline the production of brake adjusters by moving the production from the United States to Mexico. The process began in 2018 when machining of brake adjusters in the US was moved to India. In a final step, the assembly is now being moved from the plant in Blue Springs (Missouri), USA to Mexico. Brake adjusters are Haldex’s largest product and they will from now on be manufactured in China, India, Hungary, Brazil and Mexico.

By co-locating the production of brake adjusters with the production in Mexico, Haldex’s largest production facility globally, and thereby producing more products in one facility, economies of scale are achieved. The manufacturing cost in Mexico is also significantly lower than the cost in USA. The cost saving is estimated at SEK 25 million on an annual basis, once the move is fully completed. A total of 154 employees are affected, of which a few will be offered new positions within Haldex’s US operations. The move will start immediately and will be completed during the fourth quarter of 2020.

During the fourth quarter of 2019, earnings will be impacted with SEK 27 million as one-off costs related to the change in production.

Haldex has the financial target of reaching ten percent operating margin in 2022, excluding investments in new technology. During the second quarter Haldex announced closure of two of its US based Friction centers, resulting in SEK 6,5 million in annual savings and SEK 5 million in one-off costs. 

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY

Cybera Earns Industry Accolades for Excellence in Technology and Services

Image

Cybera Earns Industry Accolades for Excellence in Technology and Services

The company earned a 2019 IoT Evolution Security Excellence award from IoT Evolution World and was awarded gold status for “Managed Security Service” and “Support Team of the Year” from the Golden Bridge Awards®.

Cybera, the leader in SD-WAN application and security services for the network edge, today announced industry accolades from two programs that recognize excellence in technology and services.

The first program, the 2019 Security Excellence Award from IoT Evolution World, was given to the company’s platform, the CyberaONE™ Solution, which applies software-defined networking principles to modernize the Wide-Area-Network (WAN) into a unique form of SD-WAN. Security is embedded in the CyberaONE Solution, using a services framework designed around the concept of micro segmentation. This approach ensures that each application can operate within its own virtual network and fits well for customers who want to tailor security and performance policies while also reducing networking costs.

“We are extremely proud to have earned these awards for our product innovations as well as our dedicated support of customers,” said Bethany Allee, executive vice president of Marketing at Cybera. “Our priority is to deliver the highest-quality network, security, and IT resources needed to operate a business at the edge of the enterprise. By fulfilling this essential need, we’re providing customers with the freedom to focus more of their time and resources on strategic business initiatives and growth.”

CyberaVUE™ also earned the highest designation of “Gold” for managed security service innovation in the Golden Bridge Awards, an annual recognition program honoring the best companies in every major industry in North America, Europe, Middle East, Africa, Asia-Pacific, and Latin-America. The award honors organizations delivering exemplary software or hardware solutions that secure IoT devices and networks.

CyberaVUE provides customers with real-time analytics and visibility to monitor network health and performance while dramatically reducing costs. CyberaVUE also helps to optimize application performance, enhance brand protection, and accelerate speed-to-market at remote customer sites.

Additionally, the company received a “Gold” designation from the Golden Bridge Awards as the “support team of the year.”

More than 160 judges from around the world participated in the awards contest, and their average scores determined the 2019 Golden Bridge Awards Finalists and Winners. Winners will be honored in San Francisco on October 28, 2019, during the annual Red Carpet SVUS Awards Ceremony.

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY

Boomi Announces Insights, Innovation in API Management, and Expanded Event Driven Architecture Support for Boomi Platform

Image

Boomi Announces Insights, Innovation in API Management, and Expanded Event Driven Architecture Support for Boomi Platform

Boomi, a Dell Technologies business, today announced its product vision for the future, as well as product enhancements available today, including expanded functionality of its full lifecycle API Management, at the company’s annual conference, Boomi World 2019. The company unveiled details about ‘business insights,’ and its Event Driven Architecture (EDA) initiative that enables customers to experiment, develop and adopt event driven architectures seamlessly.

“Our customers are always being asked to do more with less. No one is asking for less data slower, and they have to be able to unify past, present and future data and applications seamlessly within their digital ecosystems,” said Michael Morton, Boomi’s Chief Technology Officer.

“Customers are looking to Boomi to help solve their business problems and allowing them to achieve all kinds of business outcomes, faster. To do so they have to connect everything in real-time.”


Boomi’s Insights

Morton and Boomi’s Chief Product Officer, Steve Wood, announced on stage at Boomi World ‘19, how Boomi’s platform provides business insights, and offers intelligence capabilities that raise the bar in the iPaaS market. Boomi can deliver real, actionable insights about how a customer’s business operates day-to-day in a way that no other iPaaS can. Boomi’s technology can deliver a higher order of insights around the categorization of data that customers are transacting.

Boomi is enabling enterprise leaders to glean business insights from their connected digital ecosystem. The more a customer integrates with Boomi, the richer the insights become. As an example, from the very same meta-data that is produced today, customers have the opportunity to gain insights into the detection and movement of sensitive data, which applications are moving the data and how often it is being moved. These business insights allow customers to make more informed business and technology decisions.

And of course, the customer dictates what clouds or servers you connect to and where you send your data – the power over customer data sits with the customer.


Full Lifecycle API Management

Boomi’s API management offering allows customers to leverage their data and processes, and engage a broader ecosystem including internal business units, partners and customers. With this announcement, Boomi can support full lifecycle API management with three key functionalities – API Proxy, API Gateway, and API Developer Portal. Boomi provides businesses with the security and scalability to confidently leverage their data and drive successful outcomes in the API economy.

“Organizations want to extend the use of their data and application assets beyond the confines of their own ecosystem to a broader set of consumers,” said Steve Wood, Boomi’s Chief Product Officer.

“They want to engage their own customer base and provide an expanded breadth of services by extending them as APIs. The new Boomi full lifecycle API Management capabilities deliver the ease of use and time to value to quickly spin up APIs while providing enterprises with the requisite security, governance and scalability assurances to extend their reach.”


Benefits of the enhancements to Boomi’s full lifecycle API Management include:

Faster time to value– The new Boomi API Developer Portal offers self-service options that shortens the time to achieving business outcomes. It enables consumer engagement by providing discoverability of available services. Its self-service approach enables developers to self-administer applications, self-register and approve the use of APIs.

Greater security & scalability– The Boomi API Gateway provides a governance mechanism that protects the execution of APIs while providing that essential layer for scalability. The API Gateway is built on top of the Boomi Atom runtime distribution technology. This makes it ideal for governing external APIs or internal microservices that require governance and protection, either on-premise, in the cloud, or at the edge.

Seamless integration with third-party APIs– The Boomi API Proxy enables the ability to use Boomi as a centralized mechanism for all APIs and services created within or outside of Boomi. With the API Proxy, customers can easily incorporate third-party data and third-party APIs. Boomi’s API Proxy provides customers with that essential tool to easily manage their multi-cloud deployments using the lightweight Boomi runtime infrastructure.

In addition to API design and Management, Boomi’s cloud-native unified platform designed for ease of use and high productivity also includes application and data integration, a master data hub, B2B/EDI management, app development and workflow automation.


Connect Everything Seamlessly with Event Driven Architectures

Boomi also announced a new customer focused program that enables organizations to experiment, develop, and adopt event driven architectures seamlessly.

Gartner has commented recently that, “EDA is at the very heart of real-time-sensitive digital business. Organizations capture real-world business events in digital form as they happen, by ‘listening’ to event sources like Internet of Things (IoT) devices, mobile applications, ecosystems, and social and business networks.”

Starting today, customers can learn and deploy Event Driven Architecture solutions with Boomi through the new EDA page. Growing its EDA partner ecosystem, Boomi is expanding its offering by collaborating with market leaders like Dell EMC around its Pravega project, and Solace with its PubSub technology. Boomi’s EDA initiative also focuses on building a strong partner ecosystem with market leaders around message brokers, event meshes, streaming, and pub/sub technology. Boomi offers integrations for Amazon SQS, Microsoft’s Azure Service Bus services, and Pivotal’s RabbitMQ addressing a variety of use cases to meet customer needs.

With Boomi’s EDA initiative customers are now able to get targeted support as they integrate their solutions with existing applications built using Boomi’s suite of tools. Customers interested in EDA and looking to accelerate their implementations now have a single source of knowledge to help cut through the noise and expedite their journey.

Share this around

Share this around

Discover excellence

Wish news would travel a bit faster?

We can send you regular updates so you'll never miss a thing. Simply subscribe to our list and we'll keep you in the post!

SUBSCRIBE TODAY