Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

James Donner
on 12 February 2016

Telco Demos With Juju: APIdaze


From Big Data to web services, there is so much that can be made with our service modeling tool Juju. As we count down to Mobile World Congress, we’ll be diving into the telco focused Juju solutions that make deploying innovative SaaS services simple.

APIdaze provides an API for building telecom services and web applications. Using the REST API, developers can collect phone numbers, make calls, send SMS, fax, manage SIP accounts, and more. APIdaze recently joined the Charm Partner Programme and are currently charming both APIdaze.io and Widget4Call. The combination of their API solutions with the ease of Juju Charms will enable users to create, deploy, scale and integrate telecom and web applications within minutes.

One example of a telecom application enabled by APIdaze is the click-to-call service Widget4Call. Widget4Call is a simple HTML & JavaScript code that can be inserted into a website to allow users to contact companies at the click of a button. Enabling a quick solution for inquiries on the web can reduce cart abandonment as well as leading to an increase in sales.

But what about the configuration stage? If a service operator was to install this service, the API would most likely need to be replicated on the operator’s infrastructure. With Juju, instancing the web server becomes an incredibly simple process. Just how simple? See for yourself in this video demonstration from TADsummit Lisbon.

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...