Latest posts
In a vulnerable online world, what should you expect from a SaaS provider?
Last month the massive Heartbleed security vulnerability was exposed. Three weeks later a security flaw in Microsoft Internet Explorer was revealed. It seems as... read more.
APIs Can Be Copyrighted… Now What?
The battle between software giants Oracle and Google hit close to home again last week, when a Federal Court of Appeals overturned a 2-year-old... read more.
Intro to Data Integration Patterns – Aggregation
In this post I want to close the loop on introducing you to the last of the five initial patterns that we are basing... read more.
Intro to Data Integration Patterns – Correlation
So far, in this series, we have covered Migration, Broadcast, Bi-Directional Sync, and today we are going to cover a new integration pattern: Correlation.... read more.
Intro to Data Integration Patterns – Bi-Directional Sync
In this post I will continue talking about the various integration patterns that we used as the basis for our Anypoint Templates. The next... read more.
Intro to Data Integration Patterns – Broadcast
In my post yesterday, we did a brief introduction to the migration pattern. Today we are going to do a similar overview of the... read more.
Intro to Data Integration Patterns – Migration
Hi all, in this post I wanted to introduce you to how we are thinking about integration patterns at MuleSoft. Patterns are the most... read more.
APIs and the Internet of Things – Top Integration and API Articles of the Week
Here's our weekly roundup of the top 5 integration and API articles of the week. Take a look, let us know if we missed... read more.
Man in the Mirror, Apple’s Security Flaw, and the Importance of Unit Testing
The "Man-in-the-Middle” attack is such a well-recognized security risk, with established solutions and preventative measures in place that when I first heard about the... read more.






