Systems | Development | Analytics | API | Testing

Beyond Static Routing: Modernizing API Logic with Conditional Policy Execution

Modern API architectures are no longer linear. A single request can traverse multiple layers of authentication, transformation, enrichment, and observability. As these flows grow more dynamic, the need for fine-grained control over when plugins execute becomes critical. For years, the standard approach to API Gateway configuration followed a strict hierarchical model: you applied a plugin to a Service, a Route, or a Consumer.

Your "clean code" is costing the company millions #speedscale #darkcode #coding #aiagents #claude

If it passes the tests, it’s not my problem. If you’re still manually checking every line of code in 2026, you’re just wasting company time. Let the AI cook and go touch some grass. Check out: speedscale.com.

iPaaS Tools: Comparison of iPaaS Solutions | DreamFactory

With the relative newness of the iPaaS (Integration Platform as a Service) vertical, no single platform has emerged as the de facto choice for enterprises. This can present a challenge if you're trying to choose among the large pool of solutions available – especially when certain solutions labeled "iPaaS" serve very different use-cases.

No More Static Secrets: Kong Expands Cloud-Native Authentication Support

How Kong Gateway 3.14 closes the consistency gap in IAM-based authentication across AWS, Azure and GCP — and what it means for your production deployments Enterprise security teams have clear requirements: no static credentials, no exceptions. Every service-to-service connection, whether it's Kong talking to databases, caches, or vaults, should authenticate using the same IAM-based identity model that governs the rest of their cloud infrastructure.

Identity Passthrough for Hybrid AI | DreamFactory

Hybrid AI systems need secure ways to manage user identities across cloud and on-premises environments. Identity passthrough ensures that AI systems operate under the permissions of the actual user, not a shared service account. This approach reduces risks tied to credential theft, improves auditability, and supports compliance with regulations like GDPR and HIPAA. Key methods for identity passthrough include: Quick Takeaway: For organizations prioritizing simplicity, PHS is a good starting point.

Govern the Full AI Data Path with Kong AI Gateway 3.14

The shift from single-model AI features to multi-agent pipelines is no longer a future concern — it's running in production today. MCP has become the de facto protocol for tool-calling, agent-to-agent (A2A) communication patterns are proliferating, and enterprise teams are wiring together complex AI workflows that span multiple providers, services, and agents. Every hop in that data path is an opportunity for something to go wrong. The challenge is governance.

Introducing Kong Agent Gateway: The Complete AI Gateway for Agent-to-Agent Communication

Kong Agent Gateway Is Here — And It Completes the AI Data Path You had a request going to a model, a response coming back, and a gateway in between to enforce policy. With the right solutions, this becomes manageable pretty quickly.. That world is over. Today's agentic architectures look nothing like that. Agents are delegating tasks to other agents via A2A. These other agents are producing and consuming event streams.

EP20: The Agentic Enterprise

In this episode, *Dr. Sanjiva Weerawarana* and *Asanka Abeysinghe* are joined by WSO2 Chief AI Officer *Rania Khalaf* to discuss what the agentic enterprise really means. The conversation looks beyond AI pilots and explores the architectural foundations needed to make agents practical at enterprise scale. Topics include agents as first-class actors, the platform capabilities required to support them, and why identity, policy, observability, and audit matter in an agentic world. The episode closes with a practical view of what architects should start doing now.

6 Practical Examples of APIs in Everyday Life

APIs are bits of software that act as interpreters for two different programs. They'll connect to each service via endpoints and relay messages back and forth, doing the work of software integration for you. DreamFactory is a secure, self-hosted enterprise data access platform that provides governed API access to any data source, connecting enterprise applications and on-prem LLMs with role-based access and identity passthrough. But how does this actually look in the real world?