Agile Integration Architecture Technical Whitepaper

Agile | September 10, 2019

article image
Agile Integration Methodology: Container-Based and Microservices-Aligned Lightweight Integration Runtimes - This paper explores the merits of agile integration architecture--a container-based, decentralized, and microservices-aligned approach for integration solutions that meets the demands of agility, scalability, and resilienc

Spotlight

InfoSight, Inc.

InfoSight, Inc. offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud. We combine consulting with technology to help you minimize your risk exposure through security assurance and regulatory compliance.

OTHER ARTICLES

Microsoft Acquires npm: A Healthy Move for Critical Public Infrastructure

Article | March 16, 2020

Today, news broke that GitHub and its parent company Microsoft, acquired npm and its public repository of open source JavaScript packages. In 2018 when Microsoft acquired Github, many in the developer community had a cautious, even emotional response. Given today’s announcement that GitHub is acquiring npm -- the same concerns are likely to surface again since JavaScript is one of the world’s most popular programming languages and since the commons of the global JavaScript community reside within the fabric of npm.

Read More

Why we need more 5G cyberhacks

Article | February 24, 2020

How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Read More

Benefits of Kubernetes on bare metal cloud infrastructure

Article | March 3, 2020

Bare metal cloud infrastructure is being introduced to run 5G applications in containers. This is a natural development of the shift the industry is going through from virtualized network functions to cloud native applications. But what are the benefits of running Kubernetes on a bare metal cloud infrastructure compared to a virtualized infrastructure? Let’s start with a brief recap on cloud native and CNCF – Cloud Native Computing Foundation. With the introduction of 5G, new use cases drive the need for designing applications based on containers and service-based architecture to address some technology gaps associated with virtualization. The most important technology gaps involve smoother software upgrades, automation and the realization of a CI/CD software pipeline to end customers.

Read More

How to backup hyperconverged infrastructure

Article | May 4, 2020

Enterprises running hypervisors on hyper-converged infrastructure (HCI) systems typically have backup options available to them that are not available to those running on generic hardware. Such customers may also have additional backup challenges depending on the HCI vendor and hypervisor they have chosen. Let’s take a look.

Read More

Spotlight

InfoSight, Inc.

InfoSight, Inc. offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud. We combine consulting with technology to help you minimize your risk exposure through security assurance and regulatory compliance.

Events