On Connectivity and Conflict: Part 2
In Part 1 of this blog series, I broke down the “two generals problem” and shared how it affects IT leaders today. In this post, I will share the details…
In Part 1 of this blog series, I broke down the “two generals problem” and shared how it affects IT leaders today. In this post, I will share the details…
The Two Generals’ Problem is a well-known thought experiment about how asynchronous – and potentially unreliable – communications can cause, shall we say, issues. These great generals from history…
President Biden issued an “Executive Order on Improving the Nation’s Cybersecurity” as of May 12, 2021. The order includes numerous actions and mandates to confront the dangers of cyber attacks…
The concept of zero-trust security is relatively simple. In essence, no entity or system should have trust by default. You should assume that any system you are talking to is…
What is a DMZ Network? A DMZ – Demilitarized Zone – is a military term, roughly summarized, as an area between two adversaries established as a buffer in order to…
At Kong, I get a chance to discuss with various organizations their plans and projects to adopt microservices and expose them with APIs. During these discussions, I’ve started to recognize…