Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
All content for api connections is the property of Jon Scheele and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
Data Integration: Connecting Business Systems, with Fethi Rabhi and Alan Hsiao
api connections
25 minutes
3 months ago
Data Integration: Connecting Business Systems, with Fethi Rabhi and Alan Hsiao
In this conversation, Jon Scheele, Fethi Rabhi, and Alan Hsiao discuss the complexities of data integration, particularly in the context of e-invoicing. They explore the challenges faced by businesses in automating invoicing processes, the importance of standards like PEPPOL, and the limitations of current systems. The discussion also touches on the future of invoicing, automation, and the potential impact of AI and blockchain technology on business processes. Takeaways Data integration is ...
api connections
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...