Systems | Development | Analytics | API | Testing

The Power of Unlocking and Unifying Data

Every day, humans produce 2.5 quintillion bytes of data. Just to put that number into perspective, there are 18 zeros in a quintillion. Unifying data can allow you to take advantage of it and benefit your business. The vast majority of organizations have collected nearly endless amounts of data. Yet, these same organizations are starving for information that can be used to make more informed decisions. Information may be stored in databases that don’t talk to each other.

Preventing PII in Test environments

Data privacy and security are a top concern for most organizations. It’s easy to see why given changes over the past few years. These types of protections can be great for us as consumers. However, they also make it extremely difficult to create realistic production simulations in pre-production. It’s hard to rapidly develop new applications if you can’t iterate against realistic data.

Using Apache Solr REST API in CDP Public Cloud

The Apache Solr cluster is available in CDP Public Cloud, using the “Data exploration and analytics” data hub template. In this article we will investigate how to connect to the Solr REST API running in the Public Cloud, and highlight the performance impact of session cookie configurations when Apache Knox Gateway is used to proxy the traffic to Solr servers. Information in this blog post can be useful for engineers developing Apache Solr client applications.

Introducing Kong Gateway Operator

Kong Gateway Operator is a next-generation deployment mechanism founded on the operator pattern that allows Kong Gateways to be provisioned in a dynamic and Kubernetes-native way, enabling automation of #Kong cluster operations and management of the Gateway lifecycle. In this video @Viktor Gamov , a principal developer advocate with @Kong demonstrates how to install Kong Gateway Operator, how to enable HTTP routes and how to upgrade Kong Gateway in seconds without downtime.

Surviving the API Security Apocalypse

With more and more businesses transforming themselves digitally, it has become critical to secure your APIs. An insecure API is an easy target for attackers to gain access to an otherwise secure computer or network. We invite you to learn about API security best practices to protect against cyberattacks, API misuse, data breaches, and zombie APIs.

From Data Lake to Data Mesh: How Data Mesh Benefits Businesses

Current data architecture is going through a revolution. Enterprises are starting to shift away from the monolithic data lake towards something less centralized: data mesh. Data mesh is a relatively new concept, first coined in 2019, that addresses potential issues with data warehouses and data lakes that can cause businesses to be slow, unresponsive, or even suffer from data silos. Data mesh benefits are able to provide a wealth of advantages to your business.

Building your Cloud Nervous System: Kong CEO and Co-Founder, Augusto Marietti, Kong Summit 2022

APIs are the building blocks of modern applications. They have become the neural network of the cloud. Behind every interface, millions of APIs power the experience. Watch Kong's Chief Executive Officers and Co-Founder, August Marietti's recorded Kong Summit 2022 keynote to understand how APIs have transformed over the last 10 years, and what's on the horizon for Kong. Dive into product demos from Kong experts, and hear first hand insights on case studies from Kong Enterprise customers.

Building an API vision to transform your business: Kong CTO, Co-Founder Marco Palladino, Kong Summit

Kong began as concept in 2009. Today, Kong has nearly 10 Trillion API calls per month. APIs allow us to break down the silos, opening the doors across what every team is doing. Join Kong CTO and Co-founder Marco Palladino in his Kong Summit 2022 Keynote, as he covers the new frontier of API management technology. Hear customer stories and see a product demo to learn how an API vision can transform a business.