Operations | Monitoring | ITSM | DevOps | Cloud

Messaging

Authentication Methods for the Mattermost Apps Framework

In the first part of this series, we explored the fastest way to get started with Mattermost Apps. In the second installment, we looked under the hood of a Mattermost App and examined how it works and how its components interact with each other. In this piece, we’ll outline the various authentication methods available using the Mattermost Apps framework.

Nastel Products Are Not Affected by Log4j Vulnerability Issues

Recent news about Log4j has enterprises and vendors scrambling for information and answers, including customers of messaging middleware and Integration Infrastructure Management (i2M) products. Nastel Technologies customers will not be exposed to any risks from this vulnerability, but enterprises are encouraged to check with their Cloud and other solution vendors to protect themselves and their data.

The 5 Biggest Internet Of Things (IoT) Trends In 2022

The Internet of Things (IoT) is a term that describes the increasingly sophisticated ecosystems of online, connected devices we share our world with. The slightly odd name refers to the fact that the first iteration of the internet was simply a network of connected computers. As the internet grew, phones, office equipment like printers and scanners, and industrial machinery were added to the internet.

How We Work as a Technical Writing Team at Mattermost

In a recent blog post, I introduced the tech stack our Mattermost Technical Writing team uses every day to build, contribute to, improve, and maintain the Mattermost product documentation at docs.mattermost.com. Building on this knowledge, I’d like to share more about how we work as a writing team, the branching strategies we’ve learned to adopt, and the review workflows every documentation contribution goes through before being merged into the codebase.

Cloud computing has won. But we still don't know what that means

There’s little doubt that cloud computing is now the absolutely dominant force across enterprise computing. Most companies have switched from buying their own hardware and software to renting both from vendors who host their services in vast anonymous data centers around the globe.

Why are so many BMC customers looking to replace their Middleware Management ("BMM") solution?

A growing number of BMC users are looking for a suitable replacement for BMC’s Middleware Management (“BMM”) solutions. The most frequently cited reasons for which these organizations are looking to replace their BMC software include: Nastel’s core business is Integration Infrastructure Management (i2M). Nastel believes that the Integration Infrastructure (commonly known as “middleware”) is the nervous system of every digitally integrated business.

Mattermost Apps: All the Moving Parts

In the first part of this series, we outlined the basic steps you need to take in order to begin setting up a developer environment, installing your first app, and making use of the first commands. In this installment, we’ll aim to answer the most common questions about what was installed, how it works, and how the various pieces interact with each other. Additionally, this post will lay out all the different components that are involved in the overall lifecycle of a Mattermost app.

Sponsored Post

Leveraging Your Integration Infrastructure

The investment your organization has made in integration infrastructure (i2) over the years was necessary as the organization and the IT infrastructure grew, but it has likely been considered a necessary evil by senior management. However now that investment can be leveraged in two important new ways.