Systems | Development | Analytics | API | Testing

API

Not All MFA is Created Equal, Especially in CIAM

In many industries (finance and healthcare, to name a couple), regulations require the use of multi-factor authentication (MFA) to protect access to sensitive data and transactions. Also, an important executive order was issued, aimed at improving the cybersecurity posture within the US government by requiring all federal agencies to adopt MFA systems. Regulations and standards like these will continue to spread over more industries and transaction types.

Introducing Keploy | Your Automated API Testing Platform: AI-Driven Edge Cases, No Hallucinations

Looking for an automated test solution that offers unparalleled accuracy? Meet Keploy, your AI-driven API test engineer. Here's a description for "Introducing Keploy | Your Automated API Test Engineer: AI-Driven Edge Cases & No Hallucinations ".

Graph API: Boost Your Data Skills

In today's data-driven world, the ability to seamlessly connect, manage, and manipulate vast amounts of data is paramount for businesses and developers alike. Graph API stands at the forefront of this technological frontier, offering robust tools that facilitate complex data interactions within applications. This powerful API provides a framework for accessing and integrating data points in an intuitive and effective manner, supporting dynamic data structures across various platforms.

API Development and Testing 101: Introduction to Insomnia

Are you an API developer looking to streamline your workflow and improve efficiency? Join us for this introductory webinar on Insomnia, a powerful API design and testing platform that simplifies the entire API lifecycle. In this session, we'll explore the core features of Insomnia that make it an indispensable tool for modern API development. You'll learn how to design and prototype APIs visually, send requests with a user-friendly interface, and organize your API workflows with workspaces and environments.

Enterprise-Grade Service Mesh: A Reference Architecture with OpenShift, Istio, and Kong

This video explores how to integrate Red Hat OpenShift Container Platform, Istio Service Mesh, and Kong Ingress Controller. It shows a reference architecture with Keycloak as the identity provider running on an OpenShift cluster with Istio service mesh, sample applications, and Kong Ingress Controller. Three sample applications are showcased.

Enterprise-Grade Service Mesh: A Reference Architecture with OpenShift, Istio, and Kong

The service mesh architecture pattern has become a de facto standard for microservices-based projects. In fact, from the mesh standpoint, not just microservices but all components of an application should be under its control, including databases, event processing services, etc.