diff --git a/feature_comparison.md b/feature_comparison.md index fe39720..9011c78 100644 --- a/feature_comparison.md +++ b/feature_comparison.md @@ -65,7 +65,7 @@ In this comparison, we will be using NATS, Apache Kafka, RabbitMQ, Apache Pulsar - Streams and Services through built in publish/subscribe, request/reply, and load balanced queue subscriber patterns. + Streams and Services through built in publish/subscribe, request/reply, and load balanced queue subscriber patterns. Dynamic request permissioning and request subject obfuscation is supported. @@ -190,7 +190,7 @@ In this comparison, we will be using NATS, Apache Kafka, RabbitMQ, Apache Pulsar - Multi-tenancy is implemented through tenants; data sharing across tenants is not supported. + Multi-tenancy is implemented through tenants; built-in data sharing across tenants is not supported. Each tenant can have it’s own authentication and authorization scheme. @@ -297,7 +297,7 @@ In this comparison, we will be using NATS, Apache Kafka, RabbitMQ, Apache Pulsar - Users can configure call credentials to authorize individual calls on a service. + Users can configure call credentials to authorize fine grained individual calls on a service. @@ -445,7 +445,7 @@ NATS supports the Adaptive Edge architecture which allows for large, flexible de - gRPC is point to point and does not have a server or broker to deploy, but always requires additional pieces for production deployments. + gRPC is point to point and does not have a server or broker to deploy or manage, but always requires additional pieces for production deployments. @@ -507,7 +507,7 @@ NATS supports the Adaptive Edge architecture which allows for large, flexible de - NATS separates operations from security. Accounts are made available to a deployment through a number of mechanisms and user management may be decentralized and managed through a CLI. Server configuration is command line and configuration file which can be reloaded with changes at runtime. + NATS separates operations from security. User and Account management in a deployment may be decentralized and managed through a CLI. Server (network element) configuration is separated from security with a command line and configuration file which can be reloaded with changes at runtime.