Everyday we speak with companies looking for ways to improve the cost and performance of their application’s connectivity. When the topic of MPLS comes up, there is a predictable groan of resigned disappointment. No one is coming to its defense. How can a technology that is so widely used, be so uniformly disliked? Normally, technologies
As you may have heard, Finastra was hit with ransom-ware attacks and were forced to shut down a number of their products and services over the weekend. There are initial reports showing that Finastra may have been running an unpatched VPN with known vulnerability issues. While Finastra has not released the full details and scope
A Data Mesh creates a layer of connectivity that abstracts away the complexities of connecting, managing and supporting an application’s access to remote data. It is used to stitch together data held across multiple environments. The premise of a data mesh is that it uses software to connect environments no matter where it lives, or
In boxing, the tale of the tape is a term that refers to the measurements taken before a fight begins. It is used to ‘size up’ the competitors by things like their weight, reach and height. While not an exact science, these stats give viewers a sense of who may be dominant in a fight.
As Michael Vizard notes here, virtualization of network features helps automate the onerous and often changing tasks of compliance. Legacy systems demand massive amounts of labor or expensive toolsets (or both) to achieve even baseline compliance.
Connectivity solutions will be increasingly challenged to implement the most advanced security. Enterprise scale banks can produce enterprise scale APIs but community financial institutions must rely on different methods, frequently to several vendors at a time.