Service mesh is redefining the way we think about security, reliability, and observability when it comes to service-to-service communication. In a previous blog post about service mesh, we took a deep dive into our definition of this new pattern for inter-service communication. Today, we’re going to take you through how to use Istio, an open source cloud native service mesh for connecting and securing east-west traffic.
Recently, I read an article called “For IoT, think about creating a minimum viable ecosystem” on Stacey on IoT blog, which got me thinking about what we ourselves have been observing in the SaaS sector. In particular, the article says: “With the internet of things, companies are no longer trying to create a product to offer value, but rather establish relationships between companies and individuals to create value.
Would you imagine e-commerce without an electronic catalog or the web without search engines? Digital transformation requires single points of access to enable a wider range of people to access a wider range of information.
Editor’s note: Today we hear from Worldline, a financial services organization that creates and operates digital platforms handling billions of critical transactions between companies, partners, and customers every year. In this post, Wordline head of alliances and partnerships Michaël Petiot and head of API platform support Tanja Foing explain how APIs and API management enable this €2.3 billion enterprise to offer its services to partners in a wide variety of industries.
The word “frictionless” has emerged as a term used to describe when an action is achieved with or involving little difficulty; it is about effortlessness. This term is most commonly associated with customer experience and payments.
In the first part of this blog two-part series, we took a deep dive on Data Shuffling techniques aiming to mix up data and allowing to optionally retain logical relationships between columns. In this second part, we will now focus on Data Masking techniques as one of the main approach to guarantee Data Privacy.
Whenever an IT system, application or personal productivity tool is used inside an organization without explicit organizational approval, we talk about shadow IT. Shadow IT is not only a security and compliance nightmare, it creates a data sprawl where each group can create its data silos.
Our decision to change from a perpetual licence model to subscriptions was one of the great naive moments in Yellowfin’s history. It was about eight years ago and we had great sales growth but it was getting harder to start from scratch every year and sell more perpetual licenses. At the same time, our maintenance business was growing so we decided to flip our model and sell subscriptions. It seemed like a good idea at the time as none of our competitors were selling subscriptions.
A lot of enterprises are evolving their monolithic applications into microservices architectures. In this pattern, applications are composed of fine-grained services that communicate via APIs. Microservices promise, faster development, innovation, cloud scaling, better infrastructure optimization—and happier developers. No wonder this architecture gets so much attention.