Integration & IT Modernization

Easing Security Compliance with the OpenShift Compliance Operator: Part 1

This is the first part of a series about the OpenShift Compliance Operator, focusing on installing the operator and running a scan. Operators are a strong piece of Red Hat’s OpenShift platform, easing the operational complexity of what might otherwise be difficult pieces of the platform. Red Hat’s Compliance Operator provides some relief to the […]

New MuleSoft Team Member: Adem Karaduz

This is the first in a series of interviews with our newest MuleSoft hires. Each team member, regardless of their proficiency level, is expected to complete training in order to learn the latest and greatest about the MuleSoft platform. These certifications help us showcase our expertise to MuleSoft and to our customers. I am a […]

2020 Domo Rookie of the Year

Red Hat Names Perficient the Application Platform Success Partner of the Year

We are proud to announce that Red Hat has chosen Perficient, a Red Hat Premier Partner and Apex Partner, as the recipient of its Application Platform Success Partner of the Year award. The announcement was made today, ahead of Red Hat Summit, which will take place virtually April 27-28. Red Hat is the world’s leading […]

We'll Crack Through This Code Tonight

Introducing Our Container-Native Modernization Suite for ROSA

As a launch partner for Red Hat OpenShift Service on AWS (ROSA), we’ve developed a DevOps-in-a-box reference architecture and Kubernetes-based implementation for rapid application modernization. Kubernetes is an open-source container orchestration platform that automates many of the manual processes involved in deploying, managing, and scaling containerized applications. This means you can cluster together groups of […]

Is the Clinical Development Platform Approach Right for You?

Life sciences organizations typically manage their IT infrastructure and applications in silos. They implement disparate applications and manage the content and process within those applications separately. They then deploy integrations between those applications to streamline processes and share content and data with different business areas. Much of this work, including the development of integration tools […]

Woman Having Telemedicine Session

Virtual Health: Evolving the Experience (Beyond Virtual Visits)

As we gradually emerge into a brave, hopeful, post-pandemic world, it is incredible to look back at the courage, tenacity and spirit the U.S. healthcare system has demonstrated in combatting the virus. The journey we have shared presented many points of frustration and despair, which makes it even more important to recognize the successes and […]

Upcoming Oracle Cloud Webinar with NGL

Perficient a Launch Partner for Red Hat OpenShift Service on AWS (ROSA)

Accelerating digital transformation requires flexibility and efficiency, while also ensuring security, governance, and support structures of your public cloud strategy. For many years, Amazon Web Services (AWS) and Red Hat have collaborated to provide groundbreaking hybrid cloud solutions. Whether you’re migrating legacy applications, modernizing applications via cloud-native development, or embracing container orchestration, AWS and Red […]

Istock 641204328

How to Customize and Validate the Json Message for GrantType Access Token in Apigee

Overview This use case describes how to customize and validates JSON message for GrantType client credential – AccessToken. What is GrantType client credential? Client POST’s an API call to Apigee with client ID and client secret to fetch the access token from the registered developer application. In addition, query parameter grant_type=client_credentials must be passed in […]

Istock 641204328

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Welcome back! Last time we talked about controlling file downloads of sensitive content by using a session policy in MCAS. This time we’ll take things a step further and show you how to restrict specific activities like cut/copy, paste, and printing! If you are joining us for the first time, I encourage you to check […]

Istock 636932704 (3)

How to control sensitive data on unmanaged devices with MCAS (Part 1 of 2)

In this day and age, protecting your organization’s sensitive data has started to become exceedingly difficult. Where remote work has become the new norm, you will likely see many end-users using their own unmanaged devices to access corporate information. With this comes the risk of unmanaged devices sending/sharing sensitive information without the ability to control […]

Forrester Nowtech

Perficient Listed in Forrester Now Tech: Application Modernization and Migration Services Report

Enterprises have been modernizing and migrating applications from on-premise, legacy systems to the cloud for years. But it’s not always easy. Legacy technologies usually mean legacy knowledge and custom-built processes, databases, and solutions that easily break and lead to unnecessary downtime. Moving these legacy applications to the cloud requires adequate planning and a service provider […]

Istock 871840512

Byte 10 – Are you building the big data solutions right?.

Big data solutions are a field to process data from disparate sources, store the data, and perform analysis to get a meaningful and measurable action from the data. The benefits from big data processing provide a variety of insights, bring values to the organization.  Understand your data.  Determine intelligent actions.  Valuable decision-making.  Identification of New […]

Load More