Systems | Development | Analytics | API | Testing

May 2024

Not All MFA is Created Equal, Especially in CIAM

In many industries (finance and healthcare, to name a couple), regulations require the use of multi-factor authentication (MFA) to protect access to sensitive data and transactions. Also, an important executive order was issued, aimed at improving the cybersecurity posture within the US government by requiring all federal agencies to adopt MFA systems. Regulations and standards like these will continue to spread over more industries and transaction types.

Introducing Keploy | Your Automated API Testing Platform: AI-Driven Edge Cases, No Hallucinations

Looking for an automated test solution that offers unparalleled accuracy? Meet Keploy, your AI-driven API test engineer. Here's a description for "Introducing Keploy | Your Automated API Test Engineer: AI-Driven Edge Cases & No Hallucinations ".

Graph API: Boost Your Data Skills

In today's data-driven world, the ability to seamlessly connect, manage, and manipulate vast amounts of data is paramount for businesses and developers alike. Graph API stands at the forefront of this technological frontier, offering robust tools that facilitate complex data interactions within applications. This powerful API provides a framework for accessing and integrating data points in an intuitive and effective manner, supporting dynamic data structures across various platforms.

API Development and Testing 101: Introduction to Insomnia

Are you an API developer looking to streamline your workflow and improve efficiency? Join us for this introductory webinar on Insomnia, a powerful API design and testing platform that simplifies the entire API lifecycle. In this session, we'll explore the core features of Insomnia that make it an indispensable tool for modern API development. You'll learn how to design and prototype APIs visually, send requests with a user-friendly interface, and organize your API workflows with workspaces and environments.

Enterprise-Grade Service Mesh: A Reference Architecture with OpenShift, Istio, and Kong

This video explores how to integrate Red Hat OpenShift Container Platform, Istio Service Mesh, and Kong Ingress Controller. It shows a reference architecture with Keycloak as the identity provider running on an OpenShift cluster with Istio service mesh, sample applications, and Kong Ingress Controller. Three sample applications are showcased.

Enterprise-Grade Service Mesh: A Reference Architecture with OpenShift, Istio, and Kong

The service mesh architecture pattern has become a de facto standard for microservices-based projects. In fact, from the mesh standpoint, not just microservices but all components of an application should be under its control, including databases, event processing services, etc.

Introducing Keploy | Your automated API Test Engineer: AI-Driven Edge Cases & No Hallucinations

Looking for an automated test solution that offers unparalleled accuracy? Meet Keploy, your AI-driven API test engineer. Here's a description for "Introducing Keploy | Your Automated API Test Engineer: AI-Driven Edge Cases & No Hallucinations ".

GitTogether | GenAI & Open Source | Kunal Deo

The resurgence of Artificial Intelligence (AI) in recent years owes much to a pivotal moment: the publication of a groundbreaking paper by Google. This event underscores the significant role of Open Source in advancing AI technologies. In this presentation, we delve into how Open Source is not just influencing but also shaping the landscape of Generative AI (GenAI). However, our focus extends beyond the traditional dichotomy of Open Source versus proprietary technologies. Instead, we explore the complementary nature of both realms in fostering the development of the AI ecosystem.

Direct API-Database Coupling vs. Multi-Layered Architectures

API-database coupling vs. traditional multi-layered architectures: what’s the difference and why does it matter? The main difference between direct API-database coupling and multi-layered architectures is that the former allows the API to interact directly with the database, minimizing latency and complexity, while the latter uses multiple layers to separate concerns.

Using Moesif, Kong, and Stripe to Monetize Your AI APIs - Part 3: Managing Customer Credit

Things can get tricky when managing pre-paid, pay-as-you-go billing for monetized APIs. Three mechanisms must be in place for this type of billing to work: first, you need to be able to add credits to an account. Second, you need to be able to burn down those credits. Third, you need to be able to block users from accessing the API once they have run out of credits.

Navigating Kong Konnect Is Easier and More Powerful with the Revamped Search Bar in the UI

You can use the new comprehensive search bar in Kong Konnect to quickly retrieve the information you need across Konnect entities so you can focus on taking action. Operating through a platform search API, the new search bar’s query syntax offers advanced and precise search capabilities and is designed to cater to a wide range of search requirements, enabling you to find the information you need across different areas of the product with ease and speed.

Using Moesif, Kong, and Stripe to Monetize Your AI APIs - Part 2: Setting Up Metering and API Access

Now that we have set up our API, integrated it with Kong, and connected Stripe with Moesif, we have the infrastructure to begin billing for API usage. Now, we will move into configuring Moesif with the pricing, metering, and access control/governance pieces of the API monetization journey. Let’s kick things off by setting up the prices we want to charge for API usage in Moesif.

Observability Meets AI: Unlocking New Frontiers in Data Collection, Analysis, and Predictions

As software systems become increasingly complex, observability — the ability to understand a system's internal state based on its external outputs — has become a critical practice for developers and operations teams. Traditional observability approaches struggle to keep up with the scale and complexity of modern applications. As the amount of telemetry data grows, it becomes expensive and complex to navigate. Enter AI and its promise to revolutionize observability.

Decoding Network Traffic: Telemetry With Network Activity

Network Telemetry, in simple terms, is like having a conversation with machines or systems located far away. It’s about collecting data from these distant sources to better understand how they’re performing. Think of it as a health check-up, but for machines or systems instead of people. This technology plays a crucial role in a variety of fields.

How to Get Data Out of ERP Systems with APIs

Enterprise Resource Planning (ERP) systems are designed to streamline business operations by centralizing data across an organization. However, extracting and utilizing this data can be a complex and time-consuming process. One solution to this problem is the use of APIs (Application Programming Interfaces), which allow you to get data out of ERP systems and other software applications.

How No-Code API Tools Automatically Generate APIs

At some point, anyone who has enjoyed using a computer has wondered if they could build their own app. But software development becomes intimidating fast if you’re not a programmer. Fortunately, there is a wide range of no-code platforms available today. Even in the enterprise, there’s demand for no-code development. As APIs have become one of the most important components of the modern application ecosystem, several no-code API solutions are now available.

Create Stunning Parallax Animations On Your Website

Have you ever come across a website that made you scroll over it again just to see the motions and transitions and made you GASP, thinking how hard it must be to create these amazing animations, One such animation I saw on keploy website, the parallax effect which made me go through there Developer section twice!

Federated Connectivity: Unlocking Data Silos with API Gateways

"The whole is more than the sum of its parts." Aristotle is credited with this quote, and it's true in the world of data. Legacy systems typically approached their role in a limited manner. Each system was intended to be used by a certain user set and handle well-defined processes and associated data. The result was a disintegrated environment with data being difficult to obtain, and frequently out of date. The parts couldn't easily cooperate to make a whole.

GitTogether | GitOps Dynamics: Navigating the new era of DevOps! | Megha Kaur

GitOps enhances the DevOps experience/process. My talk is based on GitOps. I will be explaining GitOps workflow, its use cases and how companies can incorporate GitOps in their organization. I will share my experience on how I started using GitOps and what problems it is solving. I will be giving a small demo on GitOps concept to show how deployment can be done with the use of GitOps in Kubernetes. This will help developers, organization and each individual.

Introducing Choreo Copilot

We're excited to introduce Choreo Copilot (preview), which allows you to interact with Choreo. You can pose questions in natural language and Copilot will provide answers. Choreo Copilot enables you to grasp Choreo concepts, teaches you how to perform tasks in Choreo, and provides guidance when you encounter obstacles. Copilot is familiar with APIs in Choreo’s internal marketplace. Choreo already features an AI capability that enables API testing through natural language.

Using Tc-Bpf Program To Redirect Dns Traffic In Docker Containers

The adoption of eBPF (Extended Berkeley Packet Filter) has revolutionized high-performance applications, tracing, security, and packet filtering within the Linux kernel. Specifically, TC-BPF, a type of eBPF program attached to the Traffic Control (TC) layer, has emerged as a powerful tool for packet manipulation in both ingress and egress. This blog delves into the practical application of TC-BPF to redirect DNS queries in a Docker environment.

Adding Colour To The Log Output Of Logging Libraries In Go

Logging is an integral part of software development, providing developers with valuable insights into the behaviour and performance of their applications. In the Go programming language, various logging libraries, such as the standard library’s log package or third-party options like logrus , zap and zerolog, facilitate the generation of log output.

How to Set Up Pre-paid Credit-Based Billing With Stripe

In today’s subscription-driven economy, flexible billing options are crucial. While traditional post-paid models are widespread, pre-paid credit-based billing is gaining popularity. This approach empowers businesses to bill customers upfront for a set amount of usage, offering an alternative way for customers to pay for your service.

The Benefits of Exploratory Testing in Agile Environments

Agile software development places significant value on faster processes and better-quality outcomes, but there are a lot of different techniques that teams can leverage to achieve these goals. For many, automation integration has become a major priority, but there are several benefits to be seen from manual operations like exploratory testing. Let's take a look at what advantages exploratory testing can bring to agile environments.

GitTogether | Combine and Rule | Gunesh Patil

Combinatorial testing is a crucial technique for ensuring software reliability by efficiently testing various combinations of input parameters. However, manual creation and execution of test cases for all possible combinations can be time-consuming and impractical. To address this challenge, this talk introduces an open-source tool designed to streamline combinatorial testing processes, maximizing test coverage while minimizing effort.

Scram Authentication: Overcoming Mock Testing Challenges

In the vast landscape of cybersecurity, authentication stands as the guardian of digital fortresses, ensuring that only the right individuals gain access to sensitive information and services. Imagine you’re at the entrance of a top-secret facility, and you need to prove your identity to the security personnel. In the digital realm, this is precisely what authentication mechanisms do – they verify your identity before granting access.

DreamFactory: Now a Snowflake Select Partner!

We’re happy to announce that DreamFactory was added to Snowflake’s Select partnership tier! Our mutual customers are getting tremendous value by using DreamFactory and Snowflake together, and we are excited for more collaboration to come. Through this partnership, we’re aiming to make it easier than ever for businesses to access and utilize their Snowflake data without the headaches of manual API coding.

Using Moesif, Kong, and Stripe to Monetize Your AI APIs - Part 1: Integrating The Platforms

As the wave of AI sweeps through the technology landscape, many have hopped on board. Interestingly enough, and often overlooked, is that many AI capabilities are served through APIs. Fancy user interfaces integrate with the actual mechanisms where the magic happens: the APIs. So, when generating revenue through AI platforms, the APIs drive the revenue.