Want to improve your Kafka projects cost efficiency & performance? Download our free eBook
A background pattern for hero sections
An icon for a calendar

Published April 27, 2022

In order to understand the security benefits offered by IBM Cloud Pak for Integration (CP4I), it is important to learn about what it is and what it does.

What is IBM Cloud Pak for Integration? 

IBM’s Cloud Paks use Red Hat’s OpenShift Container Platform as the basis for the creation of enterprise-grade applications which are native to the cloud and provide extensive interoperability with on-site systems and environments.

How can IBM Cloud Pak for Integration Enhance a Business’s Security?
An icon for a calendar

Published April 1, 2022

In order to answer the question of why a business needs middleware management, it is necessary to define what middleware is (what is middleware). It is generally accepted that middleware is software that sits between existing systems and processes and helps to smooth integration and interaction between them.

Why does a business need middleware management?
An icon for a calendar

Published March 25, 2022

Nastel technical specialist, Terry House, has written a blog post here looking at the IBM MQ appliance and comparing it to the traditional software form of IBM MQ. He explores the additional security and cost benefits and also the additional monitoring and management requirements that are addressed by the Nastel Navigator X i2M platform.

Monitor IBM MQ Appliance Metrics
An icon for a calendar

Published March 24, 2022

Enterprises Relying on IBM MQ, Kafka, TIBCO EMS, Solace PubSub+, and Other i2 are Adopting Nastel Navigator for Integration Infrastructure Management (i2M)

Nastel Technologies today announced the immediate availability of Nastel Navigator 10.4, the world’s leading integration infrastructure administration and secure self-service configuration management solution.

Nastel Announces Secure Self-Service for Solace PubSub+ As Part of New Integration Infrastructure Management Release
An icon for a calendar

Published February 4, 2022

According to research by Connecting Software, Fortune 1000 firms spend 40% of their IT budget on their Integration Infrastructure. Gartner Group’s John-David Lovelock said: “…digital tech initiatives remain a top strategic business priority for companies, focusing spending on making their infrastructure bulletproof and accommodating increasingly complex hybrid work.” He continues that enterprise software will have the highest growth in 2022, driven by infrastructure software spending to outpace application software spending.

How to Unlock the Full Value From Your Investment in Integration Infrastructure
An icon for a calendar

Published November 2, 2021

In the first part, I outlined some of the terms associated with the delivery of IoT. Next, let’s look at how this gets complex.

You will need to read the state of each sensor (through their appropriate API and through their appropriate vendor-supplied hub), create logic to determine what actions must be taken when certain conditions are met, and then deliver these as a workflow to each responder, and confirm through data collected from sensors that the requested change was implemented.

What can you learn from IoT with i2M – Part 2
An icon for a calendar

Published May 4, 2021

Companies considering migration to a cloud environment usually focus first on infrastructure, from data centers to system performance to storage.

But even before you select a cloud environment, the fundamental issue to be considered must be security.

Put security first in cloud migration planning
An icon for a calendar

Published April 19, 2021

Cloud is not new. The term dates back at least twenty years. Some people will tell you that the term “cloud” just means using someone else’s computing environment, and in some ways, this is where it started.

Have Cloud Security Needs Changed Since COVID-19?
An icon for a calendar

Published February 26, 2021

There was a time when owning a cross-cut shredder for home use was considered the height of personal data security. Oh, how the world has changed!

Today we all receive incredible volumes of communication through email, social media, text messages, and phone calls, and each of these messages provides intimate details about us.

Even the smallest piece of data can prove valuable