Blog

Mar 29
Design Pattern: Data Cache & Edge Placement

Step one of the Data Blueprint is Data Cache and Edge Placement. It covers…

Mar 29
Wealth Management Blueprint

Summary This document outlines how global wealth management firms can protect their…

Mar 29
Design Pattern: Distributed Data Repository

Step two of the  Data Blueprint is the Distributed Data Repository. It…

Mar 29
Data Blueprint

Summary This document shows how to architect a digital edge that balances protection…

Mar 29
Design Pattern: Edge Analytics & Streaming Flows

Step three of the Data Blueprint, Edge Analytics and Streaming Flows, shows you…

Mar 29
Design Pattern: Security Analytics & Logging

Step five of the Security Blueprint is the Analytics and…

Mar 29
Security Blueprint

Summary This document provides you with the steps needed to secure the digital edge…

Mar 29
Design Pattern: Boundary Control

Step one of the Security Blueprintis called Boundary Control. Digital has…

Mar 29
Design Pattern: Inspection Zone

Step two of the Security Blueprint is the Inspection Zone design pattern. It…

Mar 29
Design pattern: Policy Administration & Enforcement

Step three of the Security Blueprint, the Policy Administration and Enforcement…