The American Kennel Club (AKC) was frustrated with maintaining its homegrown user registration system. It implemented Gigya's customer identity management platform to enable social login, collect structured and unstructured user data, and integrate with its marketing systems. This increased registration rates by 75% and improved email marketing results. It also gave AKC deeper insights into users, allowing it to better engage customers and increase the value per user by 35%.
With the ability to easily identify and authenticate site visitors, Learn Liberty has quickly scaled its lead lists with minimal demand generation efforts. By relying on Gigya’s Social Login to capture qualified leads, the Learn Liberty team has been able to reduce required lead generation resources by upwards of 75%.
In the age of the connected consumer, businesses have a unique opportunity to reach users at every touchpoint during the customer journey. With the growing number of devices that consumers use, it’s more important—and more challenging—than ever to gain a single view of the customer and implement effective, relevant marketing.
In this presentation, Gigya CEO Patrick Salyer, and NASCAR’s Director of Technical Operations, Ben Selland, will discuss how leveraging key demographic, psychographic and behavioral identity data, paired with an engaging digital experience, can turn anonymous users into loyal, known customers
In the age of the connected consumer, businesses have a unique opportunity to reach users at every touchpoint during the customer journey. With the growing number of devices that consumers use, it’s more important—and more challenging—than ever to gain a single view of the customer and implement effective, relevant marketing.
Gigya CEO Patrick Salyer, and Chris Schlosser, Vice President of Digital at MLS, discuss how leveraging key demographic, psychographic, and behavioral identity data, paired with an engaging digital experience, can turn anonymous users into loyal, known customers.
Kyle Morris of Gigya presented how his company designs and runs sales development at scale. He focused on building and retaining a world class team. Kyle presented at the TOPO Sales Development Council Meeting held on May 18, 2014 at the Rosewood Hotel in Menlo Park, CA.
With the ability to easily identify and authenticate site visitors, Learn Liberty has quickly scaled its lead lists with minimal demand generation efforts. By relying on Gigya’s Social Login to capture qualified leads, the Learn Liberty team has been able to reduce required lead generation resources by upwards of 75%.
In the age of the connected consumer, businesses have a unique opportunity to reach users at every touchpoint during the customer journey. With the growing number of devices that consumers use, it’s more important—and more challenging—than ever to gain a single view of the customer and implement effective, relevant marketing.
In this presentation, Gigya CEO Patrick Salyer, and NASCAR’s Director of Technical Operations, Ben Selland, will discuss how leveraging key demographic, psychographic and behavioral identity data, paired with an engaging digital experience, can turn anonymous users into loyal, known customers
In the age of the connected consumer, businesses have a unique opportunity to reach users at every touchpoint during the customer journey. With the growing number of devices that consumers use, it’s more important—and more challenging—than ever to gain a single view of the customer and implement effective, relevant marketing.
Gigya CEO Patrick Salyer, and Chris Schlosser, Vice President of Digital at MLS, discuss how leveraging key demographic, psychographic, and behavioral identity data, paired with an engaging digital experience, can turn anonymous users into loyal, known customers.
Kyle Morris of Gigya presented how his company designs and runs sales development at scale. He focused on building and retaining a world class team. Kyle presented at the TOPO Sales Development Council Meeting held on May 18, 2014 at the Rosewood Hotel in Menlo Park, CA.
Case Study: ESI Uses First-Party Data to Drive Ad Revenue with GigyaGigya
As digital ad inventory increased in volume and decreased in value, ESI Media saw the opportunity to grow ad revenue and gain a competitive advantage by offering segmented audience targeting. Using Gigya's RaaS and Profile Management, ESI was able to capture rich first-party user data to effectively understand and segment its users, resulting in:
- 30% increase in registrations
- 300% increase in CTR
- 2X campaign yields
View the presentation to see how we are changing the game in 2010. You'll find a list of all mobile services and tools we've created since the beginning of the year. You can also get a sneak peak into what we're currently working on and learn about the Game Changer Award we've received from NAR and what it'll mean for your business.
1) How to target your ideal customer
-The evolution of firmographic, demographic, technographic targeting
-Why we’re better than list acquisition
-Practical example of how to develop a growth model
2) Perform consent-based demand generation
-Consent in 2018, how to prepare
-Ad targeting needs a re-boot
-Practical example of legitimate interest advertising
3) Privacy-first prospecting
Inside sales that satisfies your legal counsel
How to leverage businesses’ company data?
Practical example of preference management
Hotels & Travel Agency SEO: Grow your customers without 'PAYING'.Chetraj Bhandari
Basic and fundamentals search engine optimisation and social media optimisation tips and tools for getting traffic, rankings and establishing local businesses like hotels, restaurants, hair salon, dental clinic, etc.
Get Better Results with Identity-Driven Marketing Automation
Gigya’s pre-built integration fuels Marketo's marketing automation software with rich first-party identity data. With Gigya and Marketo, brands can:
*Sync any data points between Gigya’s Profile Management and Marketo
*Set updates to ensure that you’re always working with accurate user data
*Build timely and relevant campaigns that foster valuable, lifetime relationships with your customers
Gigya’s Loyalty package offers a suite of gamification tools that make it easy to develop custom gamification strategies, recognize and reward users and track and measure results.
Data Sheet: Why Your eCommerce Platform Needs CIAMGigya
A specialized customer identity and access management (CIAM) solution can maximize the potential of your eCommerce platform, allowing you to deliver more relevant experiences across every touchpoint by enabling:
- Flexible registration and social login
- Customer-focused profile management
- Pre-built integrations with today's top revenue-driving technologies
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaGigya
Scottish Television, or STV, implemented Gigya's Customer Identity Management platform to enable viewers to register for accounts with minimal information, resulting in increased open and click-through rates, as well as better ad retargeting performance.
Some highlights include:
- Improved open rates by 14.5%
- Improved Click-through rates by 21.4%
- Went live in less than 6 months
To be successful today, businesses must leverage consumer data to enable great customer experiences. Doing this in a seamless and compliant way is not easy, with a shifting regulatory landscape, numerous identity providers and front-end technologies to support. Gigya's end-to-end Customer Identity Management platform helps businesses succeed by providing:
*Flexible registration and authentication to connect you with your customers
*Profile and preference management to collect all data types into unified and compliant profiles
*Powerful customer insights tools and easy integration with virtually any third-party technology
Case Study: ESI Uses First-Party Data to Drive Ad Revenue with GigyaGigya
As digital ad inventory increased in volume and decreased in value, ESI Media saw the opportunity to grow ad revenue and gain a competitive advantage by offering segmented audience targeting. Using Gigya's RaaS and Profile Management, ESI was able to capture rich first-party user data to effectively understand and segment its users, resulting in:
- 30% increase in registrations
- 300% increase in CTR
- 2X campaign yields
View the presentation to see how we are changing the game in 2010. You'll find a list of all mobile services and tools we've created since the beginning of the year. You can also get a sneak peak into what we're currently working on and learn about the Game Changer Award we've received from NAR and what it'll mean for your business.
1) How to target your ideal customer
-The evolution of firmographic, demographic, technographic targeting
-Why we’re better than list acquisition
-Practical example of how to develop a growth model
2) Perform consent-based demand generation
-Consent in 2018, how to prepare
-Ad targeting needs a re-boot
-Practical example of legitimate interest advertising
3) Privacy-first prospecting
Inside sales that satisfies your legal counsel
How to leverage businesses’ company data?
Practical example of preference management
Hotels & Travel Agency SEO: Grow your customers without 'PAYING'.Chetraj Bhandari
Basic and fundamentals search engine optimisation and social media optimisation tips and tools for getting traffic, rankings and establishing local businesses like hotels, restaurants, hair salon, dental clinic, etc.
Get Better Results with Identity-Driven Marketing Automation
Gigya’s pre-built integration fuels Marketo's marketing automation software with rich first-party identity data. With Gigya and Marketo, brands can:
*Sync any data points between Gigya’s Profile Management and Marketo
*Set updates to ensure that you’re always working with accurate user data
*Build timely and relevant campaigns that foster valuable, lifetime relationships with your customers
Gigya’s Loyalty package offers a suite of gamification tools that make it easy to develop custom gamification strategies, recognize and reward users and track and measure results.
Data Sheet: Why Your eCommerce Platform Needs CIAMGigya
A specialized customer identity and access management (CIAM) solution can maximize the potential of your eCommerce platform, allowing you to deliver more relevant experiences across every touchpoint by enabling:
- Flexible registration and social login
- Customer-focused profile management
- Pre-built integrations with today's top revenue-driving technologies
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaGigya
Scottish Television, or STV, implemented Gigya's Customer Identity Management platform to enable viewers to register for accounts with minimal information, resulting in increased open and click-through rates, as well as better ad retargeting performance.
Some highlights include:
- Improved open rates by 14.5%
- Improved Click-through rates by 21.4%
- Went live in less than 6 months
To be successful today, businesses must leverage consumer data to enable great customer experiences. Doing this in a seamless and compliant way is not easy, with a shifting regulatory landscape, numerous identity providers and front-end technologies to support. Gigya's end-to-end Customer Identity Management platform helps businesses succeed by providing:
*Flexible registration and authentication to connect you with your customers
*Profile and preference management to collect all data types into unified and compliant profiles
*Powerful customer insights tools and easy integration with virtually any third-party technology
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...Gigya
With dozens of different web properties spread across a number of international territories, a multi-billion dollar company was in need of a solution to better manage its customer identities and data at a global scale. The solution had to be scalable and flexible, offer robust administrative roles and permissions and keep the brand compliant with regional data privacy regulations.
Case Study: American Cancer Society Adopts a 360 Degree Constituent View with...Gigya
With an ever-growing user base, the American Cancer Society (ACS) needed a way to securely and efficiently manage its community of volunteers, donors and participants. By implementing Gigya's solution for customer authentication and identity management that could scale to accommodate millions of users, the American Cancer Society saw:
- 1.8 million registrations
- 20% of users logging in socially
Compliments International Web Design, SEO and Social Media Marketing Services...Compliments International
Compliments International Services Overview document provides an overview of our Web Design, Search Engine Optimization, Social Media Marketing, Training and Consulting Services.
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Gigya
DC Thomson Media, or DCT Media, chose Gigya as their customer identity provider, resulting in a 5X increase in new registrations and a 16% increase in pageviews.
White Paper: Gigya's Information Security and Data Privacy PracticesGigya
As the leading SaaS Customer Identity and Access Management provider for enterprises, Gigya is committed to maintaining a high level of performance and security Our platform is optimized for maximum e ciency and scalability while protecting our clients’ data by adhering to strict security and compliance standards This document provides an overview of Gigya’s standards for the following four categories: Infrastructure, Data Security, Compliance, and Privacy Policies.
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya
In unserer modernen datengesteuerten Welt wird es für Unternehmen immer schwieriger, die richtige Balance zwischen Personalisierung und Datenschutz zu verwirklichen.
New China Data Center Helps Gigya’s Clients Manage Compliance with New Chinese Cybersecurity Law.
As businesses expand into new markets to grow their customer bases through digital initiatives, compliance with widely variable data protection and privacy regulations is now one of the key competitive differentiators between industry leaders
and losers.
Cross-channel digital marketing today can feel like a game of chutes and ladders, with opportunities and risk at every turn. To win, businesses should build customer profiles progressively, leveraging a mature customer identity management solution to ensure that they can:
- Ask for and manage customers’ consent throughout their entire lifecycle
- Take advantage of features such as lite registration and subscription management to seamlessly engage customers earlier in the buyer journey
- Offer customers real value in exchange for their information
Build transparency into the framework of their digital strategy to build trust with customers
- Reward customers by offering continual value and incentivizing them to engage more often to drive long-term loyalty and advocacy
Digital innovation being demanded by every business unit is transforming IT’s role to that of the main driver of new growth initiatives, prompting a shift in perspective and strategy for CIOs that begins with a well-planned and executed approach to managing customer identities. While legacy IAM might seem like a natural starting point for meeting this challenge, customer identity and access management (CIAM) has significantly different requirements and outcomes when compared to employee-facing IAM.
Data Sheet: Gigya and Global Regulatory ComplianceGigya
Gigya’s Customer Identity Management platform offers features that provide maximum flexibility for building
customer consent and control into every step of the customer journey, as well as support for meeting a wide
range of regional privacy requirements. Notably, the European Union’s General Data Protection Regulation
(GDPR) comes into effect on May 25, 2018, carrying potential penalties of up to the greater of €20,000,000 or
4% of total annual global turnover.
The following data sheet illustrates how Gigya’s platform enables data privacy and compliance for our 700 clients.
2016 a été une année décisive en
matière de Gestion des identités clients
(CIM - Customer Identity Management)
et les entreprises, la presse et les
analystes se sont accordés à dire que
la technologie CIM n’était plus une «
bonne chose » au sein des entreprises
actuelles, mais un impératif.
Als die Identität der Verbraucher in vollem Gange ist, hat Gigya fünf Vorhersagen für die wichtigsten Trends, die wir sehen, wachsen im Jahr 2017 gelegt, und wie wir sehen, dass Organisationen reagieren.
Consumers now expect more trusted and personalized experiences in exchange for their personal information, but businesses are struggling to protect user privacy in light of growing global security and privacy concerns. Since tolerance is diminishing for username and password processes, today’s businesses must find new ways to secure users' data while delivering better customer experiences.
The upcoming General Data Protection Regulation (EU GDPR) will change the requirements for managing consumers’ personal data across the globe. The regulation’s scope is broad and also affects organizations outside of the EU. Striking a balance between meeting the new regulatory requirements and effectively serving customers in the age of Digital Transformation mandates a shift from siloed consumer data management to centralized Customer Identity Management platforms that support the balance between compliance, user consent, and optimizing the customer experience.
In this white paper — commissioned by Gigya from European analyst firm KuppingerCole and prepared by Fellow Analyst Dr. Karsten Kinast and Lead Analyst Ivan Niccolai — you will learn about:
*The history, framework, implementation and scope of the EU GDPR
*Key compliance elements of the EU GDPR
*The implications of the EU GDPR on Customer Identity Management and best-practice recommendations for strategy and implementation
For today’s digital businesses, being prepared to meet new compliance requirements when storing and managing consumer data will not only minimize risk, but also enable more valued and trusted customer experiences that drive increased loyalty, engagement and revenue. To gain better perspective on this important issue, it’s important to understand:
- The trends driving governmental regulatory shifts and the basic tenets of these new laws
- The challenges faced by executives across the enterprise when managing privacy compliance for consumer data
- The emergence of cloud-based solutions that help businesses manage privacy compliance by acting as end-to-end customer data storage and management solutions that are far more scalable and flexible than legacy systems
Information Security and Data Privacy PracticesGigya
Gigya’s enterprise class Customer Identity & Access Management platform delivers maximum efficiency and scalability while protecting consumer data with strict security and compliance standards. The four pillars of Gigya’s security and privacy promise are:
- Infrastructure: State-of-the-art data centers for optimized performance and scalability.
- Data Security: ISO 27001 certification and multiple levels of security protect data with both physical and virtual safeguards.
- Compliance: Regional privacy compliance and built in social network terms of service functionality ensure responsible data management.
- Privacy Policies: Increased transparency of data practices fosters consumer trust and relationships.
Russia’s new Personal Data Protection Act stipulates that companies with Russian customers must store those users’ personal data within Russian borders. To ensure that all of our clients doing business in Russia can continue to do so safely, Gigya has opened a new primary data center in Russia.
White Paper: 5 Ways Airports Can Drive Non-Aviation RevenueGigya
With airlines now accounting for just 38% of airport revenues, maximizing non-aviation earnings has never been more necessary. This white paper takes a look at how airports can drive non-aviation revenue by leveraging customer identities to create personal experiences across five key areas:
- Parking
- Retail and concessions
- Food and beverage
- Loyalty programs
- Advertising
Case Study: Unibail-Rodamco Creates a Connected, Personalized Shopping Experi...Gigya
After conducting a customer survey, Unibail-Rodamco determined that providing shoppers with personalized experiences across malls was key to its future success. By leveraging a Customer Identity Management solution to understand its shoppers' tastes and preferences, Unibail-Rodamco was able to see:
- 26% increase in registration rates
- 92% growth in loyalty card subscriptions
- 76% of registrants connecting socially
- 35x increase in mobile registrations
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Case study - American Kennel Club
1. CASE STUDY
About American Kennel Club
Founded in 1884, American Kennel Club (AKC) and
its registry have long represented the gold standard
for purebred dog pedigrees. AKC is dedicated
to promoting canine health, understanding and
companionship among its community of dog lovers.
The Challenge
After spending significant time and resources building its own
registration system, AKC was becoming frustrated with the amount
of effort it took to maintain and make updates to this homegrown
solution. What’s more, AKC’s legacy database required intense
customization to capture unstructured data, maintain privacy
compliance and feed this data to other platforms.
“We have a large Facebook following and knew that enabling site
visitors to register with their Facebook accounts would not only
drive acquisition, but also help us learn a lot more about them,” said
Steve Pessah, Senior Product Manager at the American Kennel Club.
“Implementing social login in-house just wasn’t a viable option given
the volume and complexity of third-party policies and APIs.”
The Solution
Gigya’s Customer Identity Management Platform offers an end-to-end
registration solution that makes it easy for AKC to build, customize and
deploy registration forms and flows, with screens for email verification,
password reset and more. It also supports social login via a single
API to manage Facebook and more than 25 other third-party identity
providers. Gigya’s dynamic schema Profile Management database
collects and consolidates both structured and unstructured first-party
data captured as users register and engage on-site.
American Kennel Club Drives
Campaign Conversions with
Identity-Driven Marketing
SUCCESS HIGHLIGHTS
• Reduced customer identity management
costs by 50%
• Increased email open rates by 50% and
click-throughs by 100%
• Improved Instagram growth rate by 150%
Saved 12 months of
development time
Improved registration
conversion rates
by 75%
Increased value
per user by 35%
75
12months
35