Systems | Development | Analytics | API | Testing

CMS-0057-F Interoperability and Prior Authorization: WSO2's One-Stop Guide

The Centers for Medicare & Medicaid Services (CMS) finalized the CMS-0057-F Interoperability and Prior Authorization Rule, which marks a pivotal shift in U.S. healthcare, requiring payers, providers, and health IT vendors to enable seamless data exchange through FHIR APIs. The rule is designed to reduce administrative burden, improve care coordination, and empower patients with timely access to their health information.

How We Gave Life to an AI Agent with the Unitree Go2 Robot

Every year, WSO2Con brings together developers, tech enthusiasts, and IT leaders from around the world to dive into the latest in APIs, identity management, integration, and now AI. It’s a space to learn from keynotes and hands-on sessions, share best practices, and get a first look at what’s new from WSO2. So when people walked into the AI Labs at WSO2Con, they expected to hear about AI agents. What they didn’t expect was to meet one, embodied inside a four-legged robot dog.

Architecture Diagramming: From L0 to Ln - Simplifying for Every Audience

Visual diagrams serve as a bridge across centuries, transforming complex systems into simplified forms by using abstraction to illuminate essential relationships and structures. A good example is Leonardo da Vinci’s 15th-century flying machine sketches that remain intuitive and understandable even today, after 500-plus years. That’s the power of architecture diagrams: they simplify complex systems into clear visuals, making complexity understandable now and in the future.

Securely Connecting Internal Services to WSO2 Bijira with Tailscale

Enterprises often host their backend services within private internal networks, whether in on-premises data centers or restricted cloud environments. This setup is essential for protecting sensitive data, meeting compliance requirements, and reducing exposure to external threats. But it also introduces a major hurdle: how do you let external consumers and partners access the right APIs without opening unnecessary doors into your private infrastructure?

Innovation, Inclusion, and Interoperability - Vietnam's Leap into Open Banking

Vietnam is one of Asia's most significant high-growth markets for open banking adoption. With a young, tech-savvy population, rapid digital adoption, and a vibrant fintech ecosystem, the country is uniquely positioned to leapfrog traditional banking models. Vietnam's financial sector is ripe for mobile-first innovation. The country has roughly 49 financial institutions and an internet penetration rate approaching 80% supported by a youthful, digitally proficient population.

WSO2 Supports Financial Institutions on the Path to DORA Compliance

In January this year, financial institutions across the EU were faced with a clear mandate – the Digital Operational Resilience Act (DORA): to ensure digital resilience, maintain service continuity and strengthen oversight of Information and Communication Technology (ICT) partners.

Platform Engineering is DEAD! Long Live Platform Engineers!

At least, the old version of it, the painstaking, build-it-all-yourself, duct-tape-and-dashboards era. If you’ve been around long enough, you’ve seen this movie before. Remember when system engineers were the backbone of IT? Then AWS came along, and in a matter of years, many system engineers evolved into cloud engineers, shifting from racking servers to designing scalable cloud architectures. The role didn’t disappear. It transformed.

How to Build a CI/CD Pipeline for APIs Using WSO2 API Manager and GitOps

Continuous integration and continuous delivery/deployment (CI/CD) in API management refers to the automation of building, testing, publishing, and promoting APIs across environments (development, staging, and production) using CI/CD practices. It brings DevOps principles to the API lifecycle, enabling faster and more reliable API releases.

Introducing Vibe Deployment with Choreo

With vibe coding, you can build complex applications using powerful AI tools that offer a conversational experience, letting AI handle the heavy lifting. But what happens after you've built your app? You might have a three-tier web application connected to a database running locally, but taking it live—ensuring it’s connected, secure, and production-ready—can be a complex process that disrupts your flow. What if deploying your app was just as easy as building it?

The Silent Security Problem of AI Agents: Bridging the IAM Gap

The increasing use of AI agents in enterprise workflows introduces new identity and security vulnerabilities that conventional identity and access management (IAM) systems are under-equipped to address. Here’s how to close the gap. AI agents are no longer a futuristic concept. They’re booking meetings, writing emails, generating code, automating internal workflows, and making autonomous decisions on behalf of humans or systems, or on their own.