APIs in the world of IT operations

it operations

In a previous life, I worked primarily with the operational side of the IT business, which is concerned with monitoring and operational alerting. The requirements we implemented were variations on a theme that typically started with the business asking IT to provide an SLA  for “availability” of a service as well as an SLA for the responsiveness of a service. On the surface, these requirements were clean and simple, but in practical terms, things got murky very quickly.

From CIO to CEO: Yvonne Wassenaar discusses the future of technology

blog future of technology

To survive today, companies need tech-savvy leaders. The convergence of cloud, SaaS, mobile, big data and more is turning every company into a technology company. As a result, CIOs need to step up and partner closely with business leaders to drive strategic initiatives and growth opportunities. In some cases, CIOs are even stepping up into the CEO role itself.

It’s time for a new security model

blog security apis

Traditional security models—such as firewalls and DMZs—were designed to protect the perimeter. The thinking was that if the four walls of a company were protected, then threats would be neutralised before they come anywhere near core IT infrastructure. However, when bad actors inevitably made their way inside, they were often left undetected and free to move about as they extracted sensitive business data.

Introducing Anypoint Visualizer

anypoint visualizer

With the decentralization of IT and the adoption of APIs and microservices, enterprises are struggling to keep up with an accurate view of deployed APIs and their dependencies. This lack of visibility often translates into quality issues––whether it is failed deployments, lengthy processes for identifying and diagnosing of production issues, increased technical debt, or less reuse of available assets.

Are your legacy systems living in the Jurassic Age?

legacy systems

A daily problem CIOs face is how to deal with legacy systemssystems built decades ago in what now feels like prehistoric times. Buried deep down in the depths of organizations live these scary, monolithic fossils—Mainframe-otops, ERP Rex, COBOL-odons and more—created in a much different world than the one we live in today. The challenge has now hit the radar of CEOs, as company leaders realize that they cannot innovate fast enough thanks to the cost and complexity of legacy systems.

6 Muleys share why MuleSoft is one of the best workplaces in the Bay Area

As an intern for the past month at MuleSoft in San Francisco, I’ve had the awesome opportunity to experience the company’s culture firsthand. While collaborating with the Field and Marketing teams on my projects, I find myself constantly learning from the people around me. Everyone here is whip-smart and eager to help out, so when I learned that MuleSoft had been named a best workplace in the Bay Area for the sixth year in a row,

Anypoint Platform and G-Cloud 10

G CLOUD 10

Earlier this year, we announced the development of a FedRAMP In Process implementation of Anypoint Platform––our investment in meeting the security and quality standards outlined by the US Federal Government. This month, we are excited to announce that MuleSoft is officially available on the UK government’s G-Cloud 10 framework, which aims to streamline the procurement of IT and cloud technologies for public sector bodies.

Mule Maven Plugin: Deploying Mule apps using stored encrypted credentials

maven deployment

A somewhat “hidden feature” of the Mule Maven Plugin is the ability to use stored encrypted Anypoint user credentials in deployments. Normally, when deploying an application using a deployment strategy, the user either sets plain text credentials in the application’s POM, or injects them into the plugin configuration through the command line, or sets them through a property.

Meet the top MuleSoft community contributors (June ’18)

community roundup june 2018

We are back this June with yet another Community roundup – highlighting great contributors to the MuleSoft developer community. Check out what the community was up to this month!

Roundup: Top 7 blogs – second quarter

blog roundup

In the second blog roundup of this year, we are highlighting the top 7 blogs over the last three months––providing you, our readers, with insight into the top stories you may have missed!

1. Why the monolith isn’t dead

Many praise the microservices design approach, but does this mean that a monolithic architecture is outdated and inefficient? Think again. Read this blog to learn more about monolithic architectures and see what use cases render a monolithic design ideal.