In part 1 of this series, we discussed some AWS services that work well with MuleSoft. Many of these are serverless and can be easily integrated with MuleSoft’s connectors. It’s important to understand the AWS services that work well with MuleSoft, and how they can be used in practice. …

As you probably already know, MuleSoft is a market-leading tool for APIs and integrations. MuleSoft’s strengths play well as a leader in the integration space. And, combining MuleSoft with AWS allows organizations to take advantage of the strengths of each platform in a better-together model.

When does a hybrid model make sense?

Combining technologies in a hybrid…

Talking about the need for data synchronization and architecting and implementing a solution are as different as night and day. It’s easy to find instances where synchronizing data from one system to another would minimize manual work, increase opportunities, and expose business insights.

Of course, implementing those use cases is…

APIs are the connectivity and functionality mechanisms with which enterprises can enable digital transformation. The stark growth in the number of APIs indicates how much enterprises and developers value the technology.

According to ProgrammableWeb, which chronicles the public API sector, the number of APIs has been increasing sharply since the…

There is a distinct difference between simply building an API and designing and developing an API that has the security features that allow it to reliably address the needs of the users. Here are some common API security mistakes to be aware of and helpful best practices for avoiding them.

In today’s digitally connected world, leading organizations need to proactively build, integrate, manage, and scale application ecosystem within and beyond their enterprise. For many large enterprises, it’s foundational for digital transformation.

IT decision-makers, such as CIOs, CTOs, and enterprise/integration architects, face pressure to revamp their integration strategy so they can…

There are several areas of tension in the API Security world. Exposing data and processes needs to be balanced with permission and credentials. The speed of development might be challenged with consistent implementation and standards.

Companies around the world are more excited than ever about developing and exposing APIs to…

Gartner reports that by 2022, APIs will be the most frequent target hackers will use to compromise data. API security, which should always be a concern of enterprises, requires a certain set of skills.

These skills are necessary for developing and implementing the solutions and strategies that can properly address…

Social distancing, physical distancing, and any other known form of the term has dropped many of us into the unchartered territory of the virtual workplace and working from home. After the novelty of working in your PJ’s and not having a commute wears off, it may become unsettling and frustrating.

Serverless components of the cloud feel a lot like cognitive dissonance. How does an application exist and function without a server?

No one really thinks that’s what serverless means, of course. …

Aaron Lieberman

Aaron’s passion for technology drives him to find innovative ways to help advance organizations through technology.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store