Systems | Development | Analytics | API | Testing

API

API Proxy vs API Gateway: What Are The Differences And Which Should You Use?

In this article, we will take a high-level look at the differences between an API proxy and an API gateway. When a developer publishes a public API, it’s necessary for that API to have security policies and a way to hide backend logic from API consumers. Decoupling your API from your backend services allows you to shield your apps from backend code changes, and allows users to call your API without worrying about availability.

The Only Constant Is Climate Change

I’ve just got off a call with one of the largest banks in Sweden, and my brain is racing with ideas. I need to get this down on paper. I want to drop everything I’m doing and spend the next week in that mental headspace where all you do is explore and live and breathe a topic, with occasional breaks for sleep, after which you race out of bed so you can go back to where you left off. You know what I mean. What’s got me so fired up? Climate change.

Preparing for ERP eCommerce Integration Like a Pro

If you found this article, chances are you already know why you need a solid eCommerce and ERP integration. After all, ERP is kinda of the backbone of any online shop; a master system, if you like, that allows you to effectively handle sales orders and order fulfillments, manage your supply chain and B2B partners, and keep track of the inventory, especially if you sell on multiple channels.

Deploying Kong Mesh in Multiple Security Domains

It’s not uncommon for organizations to have to deploy solutions across (or among) multiple security domains. Here, we use the term “security domain” to refer to a segregated network environment, like a restricted internal network or a DMZ. This post will explore some design considerations when deploying Kong Mesh (and Kuma, the CNCF-hosted open source project upon which Kong Mesh is built) in environments with multiple security domains.

The SaaS Providers Handbook for 2022

Many companies find that it is not enough to simply keep up with the competition in their industry. Such well-known organizations as Amazon and Microsoft continually expand their service offerings, making it hard to compete. Innovation continues to be a huge buzzword in the software industry. Tech companies need a reliable way to provide clients with what they need most, which is service wherever and whenever they need it. One industry that does this best is the SaaS (Software as a Service) space.

Kong Gateway 2.8: Increase Security and Simplify API Management

Today, we’re excited to announce the release of Kong Gateway 2.8, which further simplifies API management and improves security for all services across any infrastructure. This announcement demonstrates Kong’s continued commitment to our customers and community by providing a next-generation service connectivity platform to intelligently broker information across modern architectures.

The Top 10 Benefits of Retail Digital Transformation

There is no doubt that eCommerce is a staple in the economy post-COVID, which is why omnichannel retail will continue to be a competitive advantage moving forward. Over the past decade, online shopping channels have transitioned from an attractive option to a requirement — but this is just the beginning. You can effectively collect, integrate, and act on customer data through greater business intelligence by implementing digital technologies into your overall retail strategy.

What the heck is DPoP? | IAM Community Meetups - 2022

An Application-level proof-of-possession protections for access and refresh tokens. DPoP (Demonstrating-Proof-of-Possession) is an additional security mechanism for the token generation which overcomes the issue of bearer token which will not validate between who is requested token and who is actually using the token for the access of a particular resource. In DPoP, this will be avoided by validating the client who requested the token is the one who is actually using the token using the Signed JWT tokens known as DPoP Proof.