The document provides an overview of Bullhorn's API features including authentication, entities, metadata, subscriptions, and custom tabs. It discusses OAuth authentication including getting authentication URLs, access tokens, and refresh tokens. It provides examples of searching, querying, and paginating entities. It also covers best practices for efficient lookups, getting only needed metadata fields, and avoiding duplicate requests. Subscriptions are described for syncing data changes. Custom tabs are discussed for embedding applications using an iframe. Rate limiting is also mentioned.
Automating Workflows Through Bullhorn and PartnersJeremyOtt5
The document discusses automating workflows through Bullhorn's automation framework and partnerships with third-party providers like Herefish. It outlines the problems automation can solve, introduces Bullhorn's conditions and outcomes approach, and provides examples of automating tasks like updating records and invoking webhooks or serverless functions in response to events. Specific use cases demonstrated include updating a candidate's availability date when a placement ends and creating a job submission record via a webhook call.
This document provides a draft software requirements specification for the Interactive Logbook project. It includes an introduction, overall description of the product and its features, user requirements for the .NET client and Java 2 Micro Edition client, and system features. The document outlines requirements for document handling, audio/video recording, writing with a stylus, collaboration features like file sharing and messaging, text editing, printing, search, study aids, help features, and integration with institutional systems. It also describes the user classes, operating environments, design constraints, and assumptions.
Select All Record From Tools Menu On Find Receipts For Matching FormAhmed Elshayeb
Select All Record From Tools Menu On Find Receipts For Matching Form
كيفية إختيار جميع السطور أثناء عمل المطابقة في فاتورة مدفوعات بمجرد إختيار في القوائم
This document is an investor deck for HealthyAlways.com, which provides a one-stop patient engagement solution connecting patients with doctors. It outlines HealthyAlways.com's vision to be a trusted source for patients to ask doctors questions and refer to their expertise. The document discusses HealthyAlways.com's products and services, target markets, team, progress to date with over 100 registered doctors, and financial projections based on annual subscriptions from doctors and partnerships with hospitals and pharmaceutical companies.
Dependency Injection is a software design pattern that allows for a client to be handed all of its dependencies without having to know about anything other than its own behavior. Join us to learn how to use Apex and Custom Settings to apply this pattern and help decouple your applications. You'll head back to your shop with the tools to build independent, reusable, and easily testable code.
When building an enterprise solution or creating an app, data often comes from multiple systems, and business processes frequently cross application boundaries.
Salesforce offers a rich library of programmatic and point-and-click integration tools to customize business processes that span multiple application systems. In this webinar, we will survey the many integration options and technologies available in Salesforce, including newer API and integration features.
This webinar is the first in a series that will explore several ways to integrate systems and services with Salesforce.
Automating Workflows Through Bullhorn and PartnersJeremyOtt5
The document discusses automating workflows through Bullhorn's automation framework and partnerships with third-party providers like Herefish. It outlines the problems automation can solve, introduces Bullhorn's conditions and outcomes approach, and provides examples of automating tasks like updating records and invoking webhooks or serverless functions in response to events. Specific use cases demonstrated include updating a candidate's availability date when a placement ends and creating a job submission record via a webhook call.
This document provides a draft software requirements specification for the Interactive Logbook project. It includes an introduction, overall description of the product and its features, user requirements for the .NET client and Java 2 Micro Edition client, and system features. The document outlines requirements for document handling, audio/video recording, writing with a stylus, collaboration features like file sharing and messaging, text editing, printing, search, study aids, help features, and integration with institutional systems. It also describes the user classes, operating environments, design constraints, and assumptions.
Select All Record From Tools Menu On Find Receipts For Matching FormAhmed Elshayeb
Select All Record From Tools Menu On Find Receipts For Matching Form
كيفية إختيار جميع السطور أثناء عمل المطابقة في فاتورة مدفوعات بمجرد إختيار في القوائم
This document is an investor deck for HealthyAlways.com, which provides a one-stop patient engagement solution connecting patients with doctors. It outlines HealthyAlways.com's vision to be a trusted source for patients to ask doctors questions and refer to their expertise. The document discusses HealthyAlways.com's products and services, target markets, team, progress to date with over 100 registered doctors, and financial projections based on annual subscriptions from doctors and partnerships with hospitals and pharmaceutical companies.
Dependency Injection is a software design pattern that allows for a client to be handed all of its dependencies without having to know about anything other than its own behavior. Join us to learn how to use Apex and Custom Settings to apply this pattern and help decouple your applications. You'll head back to your shop with the tools to build independent, reusable, and easily testable code.
When building an enterprise solution or creating an app, data often comes from multiple systems, and business processes frequently cross application boundaries.
Salesforce offers a rich library of programmatic and point-and-click integration tools to customize business processes that span multiple application systems. In this webinar, we will survey the many integration options and technologies available in Salesforce, including newer API and integration features.
This webinar is the first in a series that will explore several ways to integrate systems and services with Salesforce.
Deep dive into Salesforce Connected AppDhanik Sahni
This document provides an overview of connected apps in Salesforce. It defines connected apps and their usage, protocols like OAuth and SAML, and terminology. It also demonstrates how to create a connected app, integrate a service provider using SAML or OpenID Connect, and manage access to third-party apps. The document contains examples of connected app use cases and managing OAuth access policies. It concludes by encouraging the reader to continue exploring and learning.
Microsoft dynamics ax2012 : forms and tables methods call sequences, How To?Mohamed Amine HAMDAOUI
This lab explain the sequences of methods calling in Microsoft Dynamics AX2012 between tables and forms in different case :
- Form opening
- Record creation
- Record modification
- Record saving
- Form closing
- Record deletion
- RunBase.
Also It explain some how to do correctly some common tasks on forms :
- How to catch closing method of a form
- How to access form objects
- How to enable/disable a control
- How to set visibility of a control
- How to make a control editable
- How to make a control mandatory
- How to assign a value to a control
- Allow/prevent record creation/modification/deletion
- Create/Apply range on a form DS
- Add a filter control to a form (not listPage)
- Add a filter control to a listPage
In dieser Präsentation finden Sie Hinweise, wie Sie auf Basis der Anforderungen der Prüfungsordnung ein Thema für Ihre Projektarbeit zur Prüfung der Geprüften Berufspädagogen finden.
This document provides guidance on preparing for and participating in a job interview. It discusses researching the company and position, anticipating questions, practicing delivery, and maintaining a positive demeanor. The interview process is broken down into an introductory, assessment, and concluding period. Candidates are advised to demonstrate enthusiasm, honesty, active listening, and analytical skills while avoiding negativity. Common interview questions are also listed.
The document provides guidance on writing good use cases, including outlining use cases, detailing use cases, and use case writing tips. It discusses finding actors and use cases, outlining basic and alternative flows, adding detail to flows, managing detail levels, and handling issues like user interfaces, actor choices, repetitive behavior, non-sequential steps, and conditional flows. The goal is to capture requirements clearly and at the right level of abstraction to satisfy stakeholders.
Software Craftsmanship and Agile Code GamesMike Clement
Join us to talk about what it means to be a software craftsman, how the Software Craftsmanship Manifesto (http://manifesto.softwarecraftsmanship.org/) provides a framework for us to improve.
A large part of being a software craftsman is practice. Using different "code games" we can have a full toolbelt of activities that will help us (and those around us) become better at our craft.
Agile software development promises the ability to deliver value quickly. But this isn’t just a matter of process. Uncle Bob says "the only way to go fast is to go well." But how do we go well? As software developers, we can only deliver features as fast as the code base and our skills allow us. Unfortunately the quality of our code base is directly related to our skill in the past.
Musicians and athletes spend most of their time practicing, not performing. As software developers (aspiring craftsmen) we must have practice sessions that allow us to improve our skills and develop better “code sense”. We’ll look at some different “agile code games” that will help us improve our craft.
What the Heck is OAuth and OIDC - UberConf 2018Matt Raible
OAuth is not an API or a service: it is an open standard for authorization and any developer can implement it. OAuth is a standard that applications can use to provide client applications with “secure delegated access”. OAuth works over HTTPS and authorizes devices, APIs, servers, and applications with access tokens rather than credentials, which we will go over in depth below. OpenID Connect (OIDC) is built on top of the OAuth 2.0 protocol. It allows clients to verify the identity of the user and to obtain their basic profile information.
This session covers how OAuth 2.0 and OIDC work, when to use them, and frameworks/services that simplify authentication.
Blog: https://developer.okta.com/blog/2017/06/21/what-the-heck-is-oauth
Online Tools:
- https://oauth.com/playground
- https://oauthdebugger.com
- https://oidcdebugger.com
Never Build Auth Again → https://developer.okta.com
The document is a presentation on OAuth 2 that:
1) Explains the key concepts of OAuth 2 including resource owners, authorization servers, clients, and scopes.
2) Describes the common OAuth 2 grant types including authorization code, implicit, password, and client credentials and how they apply to different use cases like web apps, mobile apps, and application access.
3) Provides examples of implementing each grant type with code snippets and diagrams of the authorization flows.
Creating a RESTful API requires considering REST principles, API practices of major tech companies, and balancing purist and pragmatic approaches. The document provides guidance on designing URLs, HTTP verbs and status codes, authentication, versioning, and other concepts to create a usable and discoverable API. It emphasizes building APIs for application developers using standard patterns like OAuth2 and focusing on common use cases.
What the Heck is OAuth and OIDC - Denver Developer Identity Workshop 2020Matt Raible
OAuth is not an API or a service: it is an open standard for authorization and any developer can implement it. OAuth is a standard that applications can use to provide client applications with “secure delegated access”. OAuth works over HTTPS and authorizes devices, APIs, servers, and applications with access tokens rather than credentials, which we will go over in-depth below. OpenID Connect (OIDC) is built on top of the OAuth 2.0 protocol. It allows clients to get the identity of the user and to obtain their basic profile information.
This session covers how OAuth 2.0 and OIDC work, when to use them, and frameworks/services that simplify authentication.
Blog: https://developer.okta.com/blog/2017/06/21/what-the-heck-is-oauth
Online Tools:
- https://oauth.com/playground
- https://oauthdebugger.com
- https://oidcdebugger.com
Never Build Auth Again → https://developer.okta.com
Api xml technical reference for integrationHalldis
This document summarizes the Bookingdom Engine API, including:
1. The ApiResult class that all API results will inherit from and includes general information like status codes.
2. The main features of the API including property search, details, calendar, pricing, availability, and booking.
3. Descriptions of each API method including URLs, parameters, and example responses with the main segments included.
This document provides an overview of Azure Active Directory (Azure AD) and Azure AD B2C. It discusses the differences between Azure AD and Azure AD B2C, the capabilities and features of Azure AD B2C including built-in and custom policies. It also provides details on key concepts in custom policies like technical profiles, claims transformations, user journeys, and relying parties.
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy WalkthroughVinu Gunasekaran
Agenda:
Reviewing the Exercise – Collect a Loyalty Number from your Customers
Getting Started with Azure AD B2C Custom Policies
Setting up the Policy
Defining the Loyalty Number Claim
Configuring Profile Editing to Include the Loyalty Number
Configure Reading and Writing the Claim
Updating the User Journey
Relying Party Declaration Updates
Integrating OAuth and Social Login Into WordpressWilliam Tam
My presentation at #wpnyc WordCampNYC 2016. An overview of how OAuth works (mostly OAuth2), and techniques for integrating it in plugins, themes, and as part of 'social login' for websites.
OAuth is an open standard for authentication that allows users to log into third party applications using their existing credentials from another service, without having to expose their password. OEmbed is a format for converting URLs into embeddable rich content like photos or videos. It allows websites to display content from other sites without having to manually embed HTML or write custom code. Both standards aim to simplify authentication and content embedding while keeping users' data and identities secure.
How to build Simple yet powerful API.pptxChanna Ly
How to build simple yet powerful API from novice to professional. API for beginners, API for gurus, Enterprise level API, REST API, JWT API, Deep dive.
This document summarizes the steps to install and configure a Shibboleth 2.0 Service Provider on CentOS including generating keys and certificates, configuring the entityID, testing connections to an Identity Provider, enabling lazy sessions, modifying logging and metadata settings, and using content settings like the .htaccess file and RequestMap to control authentication requirements.
SFDC Data Models For Pros - Simplifying The ComplexitiesBaruch Oxman
This session covers some of the most advanced ways to leverage Data Models on the Salesforce1 Platform, including polymorphism in Salesforce objects relationships, properly processing and managing one-to-many relationships between objects, getting objects details via Metadata API, and properly tracking deleted records.
Here is the full session recording from Dreamforce '15:
http://salesforce.vidyard.com/watch/hIi85kWwMgIA-dfPoCz-4Q
Deep dive into Salesforce Connected AppDhanik Sahni
This document provides an overview of connected apps in Salesforce. It defines connected apps and their usage, protocols like OAuth and SAML, and terminology. It also demonstrates how to create a connected app, integrate a service provider using SAML or OpenID Connect, and manage access to third-party apps. The document contains examples of connected app use cases and managing OAuth access policies. It concludes by encouraging the reader to continue exploring and learning.
Microsoft dynamics ax2012 : forms and tables methods call sequences, How To?Mohamed Amine HAMDAOUI
This lab explain the sequences of methods calling in Microsoft Dynamics AX2012 between tables and forms in different case :
- Form opening
- Record creation
- Record modification
- Record saving
- Form closing
- Record deletion
- RunBase.
Also It explain some how to do correctly some common tasks on forms :
- How to catch closing method of a form
- How to access form objects
- How to enable/disable a control
- How to set visibility of a control
- How to make a control editable
- How to make a control mandatory
- How to assign a value to a control
- Allow/prevent record creation/modification/deletion
- Create/Apply range on a form DS
- Add a filter control to a form (not listPage)
- Add a filter control to a listPage
In dieser Präsentation finden Sie Hinweise, wie Sie auf Basis der Anforderungen der Prüfungsordnung ein Thema für Ihre Projektarbeit zur Prüfung der Geprüften Berufspädagogen finden.
This document provides guidance on preparing for and participating in a job interview. It discusses researching the company and position, anticipating questions, practicing delivery, and maintaining a positive demeanor. The interview process is broken down into an introductory, assessment, and concluding period. Candidates are advised to demonstrate enthusiasm, honesty, active listening, and analytical skills while avoiding negativity. Common interview questions are also listed.
The document provides guidance on writing good use cases, including outlining use cases, detailing use cases, and use case writing tips. It discusses finding actors and use cases, outlining basic and alternative flows, adding detail to flows, managing detail levels, and handling issues like user interfaces, actor choices, repetitive behavior, non-sequential steps, and conditional flows. The goal is to capture requirements clearly and at the right level of abstraction to satisfy stakeholders.
Software Craftsmanship and Agile Code GamesMike Clement
Join us to talk about what it means to be a software craftsman, how the Software Craftsmanship Manifesto (http://manifesto.softwarecraftsmanship.org/) provides a framework for us to improve.
A large part of being a software craftsman is practice. Using different "code games" we can have a full toolbelt of activities that will help us (and those around us) become better at our craft.
Agile software development promises the ability to deliver value quickly. But this isn’t just a matter of process. Uncle Bob says "the only way to go fast is to go well." But how do we go well? As software developers, we can only deliver features as fast as the code base and our skills allow us. Unfortunately the quality of our code base is directly related to our skill in the past.
Musicians and athletes spend most of their time practicing, not performing. As software developers (aspiring craftsmen) we must have practice sessions that allow us to improve our skills and develop better “code sense”. We’ll look at some different “agile code games” that will help us improve our craft.
What the Heck is OAuth and OIDC - UberConf 2018Matt Raible
OAuth is not an API or a service: it is an open standard for authorization and any developer can implement it. OAuth is a standard that applications can use to provide client applications with “secure delegated access”. OAuth works over HTTPS and authorizes devices, APIs, servers, and applications with access tokens rather than credentials, which we will go over in depth below. OpenID Connect (OIDC) is built on top of the OAuth 2.0 protocol. It allows clients to verify the identity of the user and to obtain their basic profile information.
This session covers how OAuth 2.0 and OIDC work, when to use them, and frameworks/services that simplify authentication.
Blog: https://developer.okta.com/blog/2017/06/21/what-the-heck-is-oauth
Online Tools:
- https://oauth.com/playground
- https://oauthdebugger.com
- https://oidcdebugger.com
Never Build Auth Again → https://developer.okta.com
The document is a presentation on OAuth 2 that:
1) Explains the key concepts of OAuth 2 including resource owners, authorization servers, clients, and scopes.
2) Describes the common OAuth 2 grant types including authorization code, implicit, password, and client credentials and how they apply to different use cases like web apps, mobile apps, and application access.
3) Provides examples of implementing each grant type with code snippets and diagrams of the authorization flows.
Creating a RESTful API requires considering REST principles, API practices of major tech companies, and balancing purist and pragmatic approaches. The document provides guidance on designing URLs, HTTP verbs and status codes, authentication, versioning, and other concepts to create a usable and discoverable API. It emphasizes building APIs for application developers using standard patterns like OAuth2 and focusing on common use cases.
What the Heck is OAuth and OIDC - Denver Developer Identity Workshop 2020Matt Raible
OAuth is not an API or a service: it is an open standard for authorization and any developer can implement it. OAuth is a standard that applications can use to provide client applications with “secure delegated access”. OAuth works over HTTPS and authorizes devices, APIs, servers, and applications with access tokens rather than credentials, which we will go over in-depth below. OpenID Connect (OIDC) is built on top of the OAuth 2.0 protocol. It allows clients to get the identity of the user and to obtain their basic profile information.
This session covers how OAuth 2.0 and OIDC work, when to use them, and frameworks/services that simplify authentication.
Blog: https://developer.okta.com/blog/2017/06/21/what-the-heck-is-oauth
Online Tools:
- https://oauth.com/playground
- https://oauthdebugger.com
- https://oidcdebugger.com
Never Build Auth Again → https://developer.okta.com
Api xml technical reference for integrationHalldis
This document summarizes the Bookingdom Engine API, including:
1. The ApiResult class that all API results will inherit from and includes general information like status codes.
2. The main features of the API including property search, details, calendar, pricing, availability, and booking.
3. Descriptions of each API method including URLs, parameters, and example responses with the main segments included.
This document provides an overview of Azure Active Directory (Azure AD) and Azure AD B2C. It discusses the differences between Azure AD and Azure AD B2C, the capabilities and features of Azure AD B2C including built-in and custom policies. It also provides details on key concepts in custom policies like technical profiles, claims transformations, user journeys, and relying parties.
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy WalkthroughVinu Gunasekaran
Agenda:
Reviewing the Exercise – Collect a Loyalty Number from your Customers
Getting Started with Azure AD B2C Custom Policies
Setting up the Policy
Defining the Loyalty Number Claim
Configuring Profile Editing to Include the Loyalty Number
Configure Reading and Writing the Claim
Updating the User Journey
Relying Party Declaration Updates
Integrating OAuth and Social Login Into WordpressWilliam Tam
My presentation at #wpnyc WordCampNYC 2016. An overview of how OAuth works (mostly OAuth2), and techniques for integrating it in plugins, themes, and as part of 'social login' for websites.
OAuth is an open standard for authentication that allows users to log into third party applications using their existing credentials from another service, without having to expose their password. OEmbed is a format for converting URLs into embeddable rich content like photos or videos. It allows websites to display content from other sites without having to manually embed HTML or write custom code. Both standards aim to simplify authentication and content embedding while keeping users' data and identities secure.
How to build Simple yet powerful API.pptxChanna Ly
How to build simple yet powerful API from novice to professional. API for beginners, API for gurus, Enterprise level API, REST API, JWT API, Deep dive.
This document summarizes the steps to install and configure a Shibboleth 2.0 Service Provider on CentOS including generating keys and certificates, configuring the entityID, testing connections to an Identity Provider, enabling lazy sessions, modifying logging and metadata settings, and using content settings like the .htaccess file and RequestMap to control authentication requirements.
SFDC Data Models For Pros - Simplifying The ComplexitiesBaruch Oxman
This session covers some of the most advanced ways to leverage Data Models on the Salesforce1 Platform, including polymorphism in Salesforce objects relationships, properly processing and managing one-to-many relationships between objects, getting objects details via Metadata API, and properly tracking deleted records.
Here is the full session recording from Dreamforce '15:
http://salesforce.vidyard.com/watch/hIi85kWwMgIA-dfPoCz-4Q
Live Identity Services Drilldown - PDC 2008Jorgen Thelin
Live Identity Services enables developers on any platform to choose the identity integration model that best enables their scenarios, including: web or client authentication, delegated authentication, or federated authentication. Learn how to build seamless, cobranded, and customized sign-up and sign-in experiences.
Microsoft PDC 2008 - Session BB22
Frappe open day presentation from February 2013 discussed several updates:
1. The software was renamed from "Frappe" to "ERPNext" everywhere, though the rename was not fully completed.
2. The user interface was updated with a new login page, module layout, and website sitemap.
3. An API was introduced to allow accessing resources and methods via REST calls.
4. Work continued on the Frappe.io portal and syncing web pages from static files in markdown and HTML formats. Upcoming plans included improved documentation, breaking ERPNext into separate apps, and releasing the Frappe.io portal.
The document discusses integrating LinkedIn functionality into a website using OAuth authentication. It provides an overview of the LinkedIn API and OAuth process, including getting an API key, redirecting the user to LinkedIn for authorization, and requesting an access token. It also covers LinkedIn platform guidelines, API rate limiting, and making calls to the LinkedIn People and Profile APIs.
The document discusses SharePoint authentication methods including classic mode and claims-based authentication. It provides steps to set up forms-based authentication (FBA) using LDAP or SQL databases in 8 steps. It also covers configuring the web.config files for the web application, SecurityToken service, and Central Administration to support FBA and LDAP or SQL role providers. The presentation includes demos of setting up FBA and integrating with LDAP or SQL user stores.
Understanding and testing restful web servicesmwinteringham
The document provides an overview of understanding and testing RESTful web services. It discusses exploring the basics of RESTful web services using Postman, building requests to query and manipulate data, and learning different test design techniques. It also introduces the Restful-Booker API as an example to work with.
The presentation provided an overview of Google AdWords feeds including what's new, location feeds, reporting, and best practices. Key updates included feed name uniqueness, new call extension metrics, and three new feed types for apps, reviews, and locations based on Google Places data. Location feeds are associated with a Places account and have attributes and items managed automatically. Reporting on feed item performance is available, and best practices include using built-in versus custom feeds and the proper order for deleting feed components.
I Love APIs 2015: Advanced Crash Course in Apigee Edge Workshop Apigee | Google Cloud
The document discusses OAuth 2.0 authorization concepts including access tokens, refresh tokens, scopes, and grant types. It provides examples of how a third-party web application can use the authorization code grant type to obtain an access token from an authorization server to access protected resources, such as by redirecting the user to a login page to authenticate.
Similar to API Developer Training: Insights for Integrations (20)
Start to Finish: Bullhorn One and its Benefits for StaffingJeremyOtt5
Bullhorn's new mission is to provide a unified start-to-finish solution for staffing firms that addresses long-standing problems with pay and bill processes. Their previous systems resulted in manual edits, errors, and a lack of real-time financial data visibility. The new solution aims to enforce billing terms at placement, provide a modern interface, automate repetitive tasks, and integrate pay and bill fully with recruiting and sales to give staffing firms real-time visibility and eliminate silos.
Moving to the Lightning Experience: An Action PlanJeremyOtt5
This document outlines a plan for moving to the Salesforce Lightning Experience. It begins by explaining why companies should move to Lightning now, as Salesforce is focusing future developments exclusively on Lightning. It then compares the classic Salesforce user interface to Lightning, noting Lightning's advantages like a more modern user experience. The document provides examples of weaknesses in the classic interface and strengths of Lightning. It outlines key features only available in Lightning. Finally, it proposes a 5-step action plan for moving to Lightning, including understanding user needs, mapping processes, change management, and working with experts.
The Latest and Greatest: Updates to Bullhorn for SalesforceJeremyOtt5
This document summarizes updates to Bullhorn for Salesforce, including Fyre Sync, consent management, an enhanced applicant tracking system, LinkedIn integration features, browsing capabilities, and improved forms functionality. Key updates include consent tools to comply with new privacy laws, an embedded applicant tracking system, tools to sync LinkedIn profiles and communications with candidate records, enhanced browsing and mass actions for candidates, and expanded form capabilities like field flow, e-signatures, and form sets. The presentation provides details on how each new feature works and its benefits for recruiters.
The Business Case for Social Innovation from Market LeadersJeremyOtt5
This document discusses the business case for social innovation from market leaders. It defines social innovation as new solutions that meet social needs while improving capabilities and better utilizing resources. The document highlights several companies' missions that focus on improving lives, communities, and society through opportunities that help people exceed expectations and advance their careers, companies, and communities. It provides examples of social programs launched by staffing companies that have improved outcomes for associates and communities. The document concludes by inviting questions from attendees about integrating social innovation.
Practical Applications of AI: Real World ExamplesJeremyOtt5
This document provides three examples of practical AI applications: a chatbot for improving employee redeployment, entity relationship mapping using machine learning, and automated invoice parsing. The chatbot aims to address low employee redeployment by automatically checking assignment end dates. The entity relationship system identifies connections between entities in historical data. The invoice parser extracts key fields from documents to eliminate manual data entry using OCR and user training data. The examples discuss technical implementations, challenges faced, and lessons learned around data, models, infrastructure and user needs.
Onboarding Revisited: Understanding the Latest ReleaseJeremyOtt5
The document discusses Bullhorn's onboarding software. It provides an overview of the latest updates to Bullhorn Onboarding, including improved efficiency for recruiters, candidates, and operations through features like an improved document builder, approval workflows, and dashboard for monitoring document status. It demonstrates the software in action and discusses plans for continued enhancements in 2019 like autofill fields and an improved candidate portal.
Navigating the Changing Staffing Industry Landscape: Threats and OpportunitiesJeremyOtt5
This document discusses trends and opportunities in the changing staffing industry landscape. It notes that the US staffing market is projected to exceed $150 billion in 2019, with industrial and IT being the largest segments. It also discusses the growth of mergers and acquisitions in the industry as well as non-traditional sources of talent becoming increasingly important due to skills shortages. New technologies like online staffing platforms, crowdsourcing, and automation are converging with traditional staffing services. While threats include economic downturns and automation reducing some jobs, opportunities exist in leveraging new technologies, addressing skills gaps, and growing acceptance of contingent work arrangements.
- Mastech Digital is a $175M digital technologies company headquartered in Pittsburgh with offices in the US, Canada, and India. It provides IT staffing and data management/analytics services.
- Mastech Digital has been a Bullhorn Enterprise client since 2006, with over 300 active users managing 1.5M+ candidates, 40k+ companies, and 300k+ contacts.
- The presentation discusses using Bullhorn data to improve business processes, such as leveraging reports to ensure timely entry of project completion records and implementing automated de-duplication of candidate records.
The document provides an update on the roadmap and vision for Invenias. Key points include:
- Invenias has transitioned to a single API and upgraded 100 customers in the past year.
- The product roadmap focuses on transitioning from desktop to web applications, increasing engagement of senior consultants, leveraging data to improve candidate assessment, and supporting diversity and inclusion.
- Upcoming releases will include enhanced reports, candidate scoring comparisons, record level dashboards, and diversity metrics. Artificial intelligence for sentiment analysis is also being explored.
- Transitioning to web applications includes integrating with Office 365 and Gmail. The vision is for Invenias to be the leading global executive search platform
The document introduces Bullhorn's Onboarding API and key features. It discusses the Onboarding REST API, how it interacts with document fields and allows for webhooks. It also covers how data can be sent back to the ATS through flowback. Key points include how the API allows accessing onboarding entities and documents, how document fields can be dynamically configured through interactions, and how webhooks fire on document status changes to update external systems.
The document provides information on how to get the best experience with MoBull, Bullhorn's mobile app. It discusses the app's technology stack including Ionic, Angular, and Bullhorn's components. It demonstrates custom actions, field interactions, and page interactions that can customize the mobile experience. Custom actions allow performing tasks like invoking lists or displaying custom interfaces. Field and page interactions allow scripting changes to forms, fields, and sections. The document emphasizes that interactions can be used across both the mobile app and Bullhorn's web app, Novo. It also provides information on building and running the mobile app locally or on devices.
Extending Your Reach with Career Portal and Search Engine OptimizationJeremyOtt5
The document discusses new features in version 3 of the Bullhorn Career Portal including server side rendering, dynamic XML, and enhanced search engine optimization capabilities. It provides an overview of how server side rendering improves indexing of jobs by search engines. Additionally, it covers how the portal allows for rich social sharing of jobs, listing jobs on Google for Jobs, and generating an XML sitemap to assist crawlers. The document concludes with a demo and discusses future features like themes and saved searches.
The document summarizes recent evolutions to the Bullhorn REST API including enhancements to authentication, new entities, and SDKs to simplify front-end development. Key points include:
- Authentication was simplified to directly retrieve an auth code from customizations or get the access token in two steps.
- New entities like billable charges and invoice statements were added to support the Bullhorn One time tracking and invoicing workflows.
- Entities can now have effective dates to support updating values over time.
- The Taurus JavaScript SDK and Bullhorn types library make querying data and building the front-end easier through features like auto-caching and reactive programming.
- Custom cards can be built
Digital Transformation Through Change Management: Overcoming Fear and RiskJeremyOtt5
Digital transformation at Adecco involved migrating from a legacy system to a new platform called Bullhorn over several years from 2013-2017. This required overcoming fear and risk through change management.
Key aspects of the change management process included explaining the reasons for the transformation, focusing on customer needs, acknowledging the loss of the legacy system, creating a people-centric and supportive culture and environment, using a network to facilitate connections, and addressing change through workshops and examples of new useful tasks. Timing, acknowledging concerns of users, and tapping into enthusiastic employees also helped drive the transformation forward.
Beyond Lip Service: Turning Culture into a Business DriverJeremyOtt5
The document discusses best practices for building an organizational culture that embraces diversity and inclusion. It recommends that companies understand demographic shifts in the workforce, establish an executive diversity council, have leaders publicly support diversity initiatives, address unconscious biases, and confront microaggressions. The goal is for everyone in an organization to do their part to create a culture of mutual respect and understanding where all people can perform to their best abilities.
Automated Data Synchronization: Data Loader, Data Mirror & BeyondJeremyOtt5
This document discusses automated data synchronization tools from Bullhorn, including Data Loader, Data Mirror, and a proposed Data Sync API. It provides information on key features and statistics for Data Loader, the development timeline and future plans. It also summarizes Data Mirror capabilities and limitations, and outlines a proposal for a new Data Sync API and workflow to improve performance over the existing REST API approach.
Team Building Activities for Introverts.pdfConfetti
Plan events that cater to all personality types! Activities that allow for quieter interaction and personal space can create a more inclusive and supportive atmosphere for all team members and help introverts feel more valued and understood.
Check out our blog for the full list 👉 https://share.withconfetti.com/4aV7kEz
Top 11 HR Trends for 2024 That Will Change Future of WorkVantage Circle
As an HR, it is critical to keep yourself updated with the newer developments to make a smooth transition in the workplace. So, here is a list of top HR trends that will impact the workplace in 2024.
HRMantra is a cutting-edge HR technology solution that harnesses artificial intelligence for digital transformation of HR operations. It streamlines processes like attendance management, performance evaluations, project progress tracking, employee database management, and payroll processing with automated income tax & benefit plans calculations. Unlock productivity, compliance automation, and data-driven insights with this innovative HR cloud platform for the future of work.
Why you need to recognize your employees? (15 reasons + tips)Vantage Circle
Discover the top reasons for employee recognition. Learn practical tips for creating an effective recognition program that benefits employees, managers, and the entire organization.
4. BULLHORN API AUTHENTICATION
● OAUTH 2.0
● Registration
● Shared key - Best practice
● Individual Key - Per case basis
only
5. BULLHORN OAUTH
Use username, password redirect URI
to get AuthCode
Get Auth Code
Use Auth Code to get
Access Token & Refresh Token
Use Access Token to get Rest Token
Get Rest Token
Use Refresh token to get new Rest Token
Refresh Rest Token
Send Username to get Oauth URL & Rest URL
Get Rest URL
Get Access Token
10. Entity Lookup
● /search
○ Lucene-based search
○ Available for most common entities
○ Faster than Query
● /query
○ JPQL (SQL-like) querying
○ Use when search isn’t available
● /find (FastFind)
○ Searches several entities in one request
○ Useful with user input
/search/ClientContact
?query=(clientCorporation.id:123)
&fields=name,id,status
/query/CorporateUser
?where=(name='Ted Soper’)
&fields=id,email
/find
?query=monster
&countPerEntity=3
11. Entity Pagination
/search/...&count=500&start=0
Get first page
{
data: [500],
total: 1700
}
Get total from response
/search/...&count=500&start=500
Get remaining pages in parallel
/search/...&count=500&start=1000
/search/...&count=500&start=1500
● Count
○ How many objects to return
○ Default: 30
○ Max: 500
● Start
○ How many objects to skip
○ Default: 0
1
2
3
12. Efficient Lookups
● Only get the fields you need
● Avoid “fields=*”
● Exception: one-time metadata
calls
● Don’t duplicate requests
● Use /search if possible
● If you only need the count, leave
off fields/layout
/entity/JobOrder/1234/notes
?fields=comments,action
Get notes for one entity
/search/ClientContact
?query=firstName:Barry
Search for list of IDs & count
13. Metadata Lookup
● Full structural data about an entity
● Field constraints
● Reference types
● Custom field definitions
● Job track information
/meta/Candidate
?fields=*
&meta=basic
Lookup before creation
/entity/JobOrder/12345
?layout=RecordEdit
&meta=track
Add to another request
16. Subscriptions for data sync
PUT
Subscription
New
Change Events
get logged
against sub
GET
Subscription
updates
GET
Subscription
updates
New
Change Events
get logged
against sub
● Create a Subscription
based on data change
events
○ Entity create/update
○ Field map change
○ Job match search
17. Subscriptions for data sync
...event/subscription/MySubName?type=entity&names=Candidate
&eventTypes=INSERTED,UPDATED,DELETED
Example
● Parameters
○ type
○ (entity)names
○ eventTypes
19. Custom Tabs
● Custom Tab
○ Pulls in an iframe application
○ Appbridge user send request from extension to Bullhorn
○ Through appbridge make requests to the bullhorn api
20. BULLHORN OAUTH & Custom Tabs
/token?grant_type=authorization_code&code=authCod
e&client_id=clientId&client_secret=clientSecret&r
edirect_uri=redirectUrl
POST for Access Token1. Get Access Token
2. Get Rest Token
> Refresh Rest Token
/login?version=*&access_token=accessToken
GET Rest Token
Grab Auth Code from the CustomComponent/redirect
Use Auth Code from App Bridge
22. Rate Limiting
429 - “Too Many Requests”
● You have a bucket of API requests per minute
● Don't throw your request away, just wait 1 second and retry!
● Multiple apps should have multiple keys.
*This is NEW! - if you have an existing app talk to Bullhorn support if you have questions.
Schedule:00-7: Intro & REST Overview (Ted)
7-40: Code Examples (5-6 mins per) (Ted & Barry)
40-45: QA (Ethan Lead as SME)
Intros:
Ted Soper: original employee of Fyre, Principle Engineer over many of the Addon & Customer Experience products working with
Barry Shevlin: First intern (and only) at Fyre and now Backend Software engineer working on Fyre Sync, Sync Submittals
Ethan Schroeder: Enterprise Software Arch at Bullhorn, 5.5yrs
Our Time at Fyre Between us we’ve integrated 25 different ATS systems, including BUllhorn and Bullhorn for Force
1 sentence on Fyre and how much integration we have done with bullhorn
Ethan has touch every part of the API and core system at bullhorn
@ted Lead
Why It is Great
Depth of Features
Same API Bullhorn Internal Engineering Teams use it for all our addons including Novo is the same API you all have access to
Metadata API allows you to make intelligent and thorough solutions
The powerful Subscription service allows you to set watchers on all sorts of data in the bullhorn ats
Activity logs means users can audit what Application partners update/add to their system
Documentation & Resources
Open and detailed API Docs
Currently 44 Public repositories on github including libraries and examples
Support Forum
History of thousands of posts with Bullhorn technical staff available to answer API use questions
*Roughly 5 minutes per example
TED
Shared key: Each app has one client Key
All corps using partner app use the same API key
Best practice for integrator
Don't share across apps
Individual keys per corp
More bookkeeping for you & us
Able to silo troubled accounts/deployments Shared key
Best practice for integrator
Don't share across apps
Individual Key
More bookkeeping for you & us
Able to silo troubled accounts/deployments
Per case basis only
TED
I still see some ATS APIs using basic auth, static auth or even no auth. OAUTH 2 requires a little extra work but bullhorn makes it easy and secure
TED
Ted: First thing to do is get the Rest URL and Auth URL that you will use for all other API calls. To do this you send the API User Username to the login Info Endpoint
TED
Next up is the core of the process
Getting the Auth Code with ClientId, Username, password and the redirect URL of your APP
With the AUthcode you’ll send it and the ClientId & Client Secret to get your Access Token
Lastly you’ll get a short lived REST Token to actually make you API calls
TED
By default the REST Token lasts for 10 minutes, instead of going through steps 2-4 again you can just use your refresh token from step #3 and get a new REST token with 1 call. If all goes right you wont need to do steps 1-4 again.
BARRY
The bulk of a lot of integrations with the Bullhorn API will be centered around entity lookup and modification.
API is full of so many features, it’s hard to know when to use each one
BARRY
Search is best practice most often
Query is very limited use case, used for small entities like Skills or candidateEducation
Find when you don’t know what entity you want to lookup
BARRY
Normally you receive 30 results
When querying for a large number of objects, your results might not fit into one response.
With count parameter it can be expanded up to 500 in one request (300 for options).
For more than 500, pagination is needed
Total on first response
Subsequent pages can be parallel in groups of 500
BARRY
Making efficient Entity requests
Talk about performance degradation with *
Sends every single field, even custom fields that aren’t used
A lot more strain on the network layer
Especially important if you’re retrieving a large number of objects
Leaving off fields/layout returns a list of IDs and count, and is significantly faster
For a single candidate you can populate all associated records lookup
Instead of sending fields you can hand in a layout; show exactly the fields that appear in the UI
BARRY
One of the most powerful features of the API
What Novo uses to determine what to display
Field constraints
see type of a field, (number, string, date, etc.), as well as valid ranges
Can see field specialty, like currencies
Reference types - see if a field references another entity
URL to retrieve options
Custom field definitions
Labels, Types, references, etc.
Job track information
`meta=track` to retrieve metadata for a JobOrder’s job track
Retrieve an entity with its metadata attached, see the object as it is in the UI - more or less
BARRY
Reference field
Field label
Url to retrieve options
Reference metadata
Custom field w/ options
Field label
Constraints
List of all options for scalars
Ted
TODO add intro
TED
Set watcher lists to collect change events
Lets you get entity events, field map change events, and job match search events.
//OLD NOTES
*Suggested by Sam Emmons - Ted is dumb on this topic. Will work with Barry till we hit a road block.
Subscriptions for data sync vs. selecting everything by date range
Talk about subscription model and how to use it
Talk about how to coordinate with support on initial data seeds / bootstrap operations.
Candidate update events - all the updates that came through since your last request. Reget allows you to pull items you already got. Transaction ID will allow you to query edit history
TED
Set the Name: Create a unique name to identify the subscription
Set the type=entity
And names of the typesnames=Candidate
And the events you care about&eventTypes=INSERTED,UPDATED,DELETED
Ted
TODO add intro
TED
Custom Component Redirect
When navigating to the custom component in Bullhorn, a call will be made to the CustomComponent/redirectservice. That service will generate the proper endpoint for the custom component. The generated endpoint will include the following:
EntityType
UserID
CorporationID
PrivateLabelID
EntityID
currentBullhornUrl
authCode
Use the authcode to establish connection
http://bullhorn.github.io/REST-Backed-Custom-Components/
Preview panels
Custom component - suggested
TED
Next up is the core of the process
Getting the Auth Code with ClientId, Username, password and the redirect URL of your APP
With the AUthcode you’ll send it and the ClientId & Client Secret to get your Access Token
Lastly you’ll get a short lived REST Token to actually make you API calls
Ted
TODO add intro
Talk up the controls
You have a bucket of requests per your licensing model
If you are a marketplace partner you have a budget per org
Don't throw your request away, just wait 1 second!
Multiple apps should have multiple keys.