Although the offerings I'm about to discuss are different, they're interesting enough to explore more closely. Both IBM and MuleSoft are claiming that the reason for implementing their solutions is because they perceive a lack of skills in containers and Kubernetes.
This tallies with what I see in the world I work in too. It's one thing to say that you can run a few containers in the wild, but it's quite another to run them as a true cloud environment with hundreds— potentially thousands—of them.
Alongside this, containers are making some architectures change. High Availability (HA) solutions that once looked fine in the VM world now begin to look clunky and new ways of doing HA are springing up. Monitoring now becomes a headache if your failing system was brought down automatically and had been recreated before you even knew you had a problem. Never mind things like license management, where most vendors are struggling to cope with a more flexible model that true cloud requires.
I'll discuss here the two different offerings, and we can see how they are very different—but trying to solve the same skills issue.
In a white paper drafted by Osterman Research, the features and functionality of managed file transfers in a cloud-based environment were analyzed to help users identify what is most important to consider when selecting a solution. Companies of all sizes and industries are benefiting from managed file transfer solutions in the modern marketplace, as the technology aids in governing and automating data exchange between two entities. There are many types of managed file exchange options to choose from, including person-to-person, system-to-system and system-to-person. Each of these types must be protected against external threats or data loss, and should work seamlessly with existing infrastructure to offer a high return on investment.
There has been a significant amount of buzz regarding cloud-based b2b integration in recent months, particularly in light of reports that identified confusion regarding the technology's capabilities. Part of the difficulty in achieving success in the cloud is moving away from the perception that the platform is a one-size-fits-all solution when the reality is that there are many different types of services and even varied delivery models. In other words, organizations considering a cloud-based approach to any problem should first formulate an IT strategy that addresses risks, opportunities and potential adoption barriers.
Making assumptions about the future can be risky for a business, but at least considering which trends and technologies will add value down the road has become a necessity. Where as an incorrect assumption can result in wasted investment, early adopters can work out the kinks of implementation faster and benefit from more mature strategies than those that deploy solutions later.
Companies of all sizes have started to at least consider the cloud as a way to improve IT operations. Some organizations started with cloud-based email to see whether the technology could be trusted and others now entrust providers with more complicated activities like B2B integration. The cloud has become so commonplace that even long-standing adoption barriers like security are on the decline. It's easy to get caught up in the enthusiasm, but business and IT leaders should have a clear set of expectations before diving headfirst into cloud computing services.
Last month some good news emerged for the cloud-based B2B integration market, with an expected 31 percent yearly growth through 2018. However, that healthy increase may have many technology vendors jumping on the bandwagon in an attempt to take advantage of increased demand. In fact, a more recent report from Ovum expanded on the challenges associated with leveraging this technology.
IT security headlines are often filled with news about the latest catastrophic data breach or malicious privacy violation. That heightened sensitivity to the potential risks of an IT security incident has had a significant impact on cloud technology, as many company leaders decide to keep their assets closer to home rather than entrust data to the virtual cloud. There is still a little trepidation over how well cloud vendors can protect enterprise information and maintain privacy, but there has also been some good news on the IT security front: a large majority of companies that have adopted the cloud are satisfied with the level of security they've achieved.