Operations | Monitoring | ITSM | DevOps | Cloud

Messaging

Optimizing Database Connection Loads With PgBouncer and Testwick

The majority of engineers know that a minor misconfiguration might lead to some big troubles. Usually, we tend to forget the importance of that tense when we are configuring a new tool or a new service, as our focus is initially to make the tool functional and to evaluate if it fits our needs. Mattermost Cloud hosts thousands of workspaces which each one needs to have a different database backend, as in Mattermost we think that isolation is one very important aspect in our security guidelines.

Top Cloud Security Trends 2022

Enterprise cloud use cases are changing and expanding, and companies are now realizing new security challenges that need to be resolved. Cloud security solutions can include everything from new security tools to more advanced training to investing in new team strategies. See below to learn about the tops trends cloud security experts are seeing in the market.

How We Use RPC to Share Database Connections and Scale our Multi-Product Architecture

The database/sql package in the Go standard library maintains a pool of connections so that all queries going through a single *sql.DB instance will reuse the same pool. This is great because you get a connection pool out of the box. But what if you need to share the same connection pool across processes? How do you use the same API in different processes but still reuse the same pool?

Best Practices for Software Development with Mattermost

Ask any software engineer about the best way to do something and they’ll likely tell you “it depends.” Every project and team works differently and has specific concerns, requirements, and opinions, adding complexity on top of the technical and operational complexity of software development. The challenge lies in managing the work and emergent complexity while staying abreast of industry best practices in a way that fits our teams’ particular processes and environments.

Sponsored Post

Observability, AIOps, APM, and i2M: The Partner Ecosystem for IBM MQ Enterprises

Complex enterprises have an integration infrastructure (i2) layer that connects technologies and applications across cloud, data center, virtualized systems, mainframe, edge computing, etc. The i2 layer includes a core middleware application (such as IBM MQ) along with many other "integration" technologies, such as MFT (managed file transfer), IoT, REST APIs, DataPower Gateway, and other messaging technologies (i.e., Kafka, TIBCO EMS, IBM ACE, IBM Integration Bus (IIB) and more).

What InsurTech industry trends to watch for in 2022

In case you missed it, insurtech — technology developed to improve and transform the insurance industry — is having a bit of a moment. Forrester recently reported record-breaking funding for insurtechs, closing Q3 at $15 billion – more funding than in 2019 and 2020 combined – with more deals anticipated by the end-of-year.

Authentication Methods for the Mattermost Apps Framework

In the first part of this series, we explored the fastest way to get started with Mattermost Apps. In the second installment, we looked under the hood of a Mattermost App and examined how it works and how its components interact with each other. In this piece, we’ll outline the various authentication methods available using the Mattermost Apps framework.

Nastel Products Are Not Affected by Log4j Vulnerability Issues

Recent news about Log4j has enterprises and vendors scrambling for information and answers, including customers of messaging middleware and Integration Infrastructure Management (i2M) products. Nastel Technologies customers will not be exposed to any risks from this vulnerability, but enterprises are encouraged to check with their Cloud and other solution vendors to protect themselves and their data.

The 5 Biggest Internet Of Things (IoT) Trends In 2022

The Internet of Things (IoT) is a term that describes the increasingly sophisticated ecosystems of online, connected devices we share our world with. The slightly odd name refers to the fact that the first iteration of the internet was simply a network of connected computers. As the internet grew, phones, office equipment like printers and scanners, and industrial machinery were added to the internet.