Operations | Monitoring | ITSM | DevOps | Cloud

meshIQ

Kafka Security - First Steps

Apache Kafka provides an unified, high-throughput, low-latency platform for handling real-time data feeds. Installing Apache Kafka, especially the right configuration of Kafka Security including authentication and encryption is kind of a challenge. This should give a brief summary about our experience and lessons learned when trying to install and configure Apache Kafka, the right way.

Understanding Middleware: What It Is and How It Works

Distributed systems are highly scalable and efficient — but only when integrated into a powerful network. A distributed system can only function if all its applications can communicate effectively with one another. However, this is often easier said than done due to the multi-layered nature of modern architectures. Modern architectures consist of applications written in various languages with different protocols, and they are spread across multi-cloud and multi-cluster environments.

Thank You 2022 Nastel Advisory Board Members!

Formed in 2021, the Nastel Technologies Advisory Board is made up of business and IT leaders from a wide variety of sectors, across the world. These enterprise leaders and innovators understand the incredibly important role of planning for, and the management of, the integration infrastructure (i2) layer (including messaging middleware, APIs, and much more) in their enterprises to enable meeting IT and larger corporate goals in 2022.

MQTT vs RabbitMQ (AMQP 0.9.1) for IoT

RabbitMQ is an open source server that was created to support the AMQP 0.9.1 messaging protocol. It now supports other protocols as well, including MQTT 3.1.1, but AMQP 0.9.1 is its core method. So here we will compare AMQP 0.9.1 with MQTT. MQTT was designed for the Internet of Things (although it wasn’t called that at the time). Both MQTT and AMQP run over TCP connections, both are client-server in architecture and bi-directional.

Sponsored Post

Transaction Tracking vs Transaction Tracing - What's the Difference?

Transaction tracking and tracing are not the same thing. One of the top 10 banks in the world recently chose Nastel and this was their primary reason. They had a Priority 1 request processor incident on the mainframe where high value messages went missing and it took two weeks to find them. They began by looking at another vendor who said that they did transaction tracking. As the customer said, "They will try to tell you that they do transaction tracking, and that took us a while to drill down." So, let me explain the difference between these terms using an analogy.

Your Telemetry Data is Faster, Is Your Analysis?

Continuous intelligence (CI) platforms can be used to collect telemetry data from various sources, perform analysis on that data, make inferences about the data, and provide real-time insights that help businesses understand what’s going on. For years, network, application performance, and security monitoring were fairly passive operations. Systems collected key telemetry data, and operators received alerts when a particular metric crossed a preset threshold. Operations were limited in two ways.

Why IoT Can Be a Game-Changer for Digital Customer Experience

The US may be heading for a recession this year. It isn’t slowing down growth in the global Internet of Things (IoT) services market. That’s expected to grow from $163.7 billion in 2021 to $188.8 billion in 2022 at a compound annual growth rate (CAGR) of 15.3%, according to Reportlinker.com. The market is expected to reach $340.61 billion in 2026 at a CAGR of 15.9%.

Cloud security risks remain very human

Most of us picture cloud security threats as bad actors in some hostile country. More often, it’s you and your coworkers. Talk about cloud security and you’re likely to discuss provider-focused issues: not enough security, not enough auditing, not enough planning. However, the biggest cloud security risks continue to be the people who walk beside you in the hallways.