Systems | Development | Analytics | API | Testing

Insomnia 201: How Can Insomnia Support Real World API Development & Testing

Insomnia is a critical tool for the design, development, and testing of your business critical APIs. In the 101 course, we covered the basics of the API client for new users. For the 201 course, we will develop a basic REST API to demonstrate how Insomnia is an essential tool in the build stage of the API lifecycle. Join this workshop to learn how to: In preparation for the workshop, please make sure you have the following ready.

Getting Started with gRPC: A Developer's Guide

Within the realms of microservices and distributed systems, gRPC has emerged as a cornerstone technology. Its adoption by tech giants like Google, Netflix, and Square underscores its capability to facilitate high-performance, scalable inter-service communication. Built as a modern take on the traditional Remote Procedure Call (RPC) paradigm, gRPC enables services, potentially written in different languages, to communicate efficiently and reliably across networks.

Android Emulator Setup Guide for App Testing

The Android emulator is an Android virtual device that is used to test and debug Android code. It looks and behaves the same as a physical Android device, and while it has some limitations (more of which later), it provides real time and cost savings for developers. Unlike the iPhone, which is limited to one manufacturer and a specific number of iOS versions, there are thousands of Android device types out there.

API Management: How to Monitor API Usage Across Multiple API Gateways

Enterprise organizations rarely operate with a single API gateway. As business units adopt technologies independently, it is common to find, for example, Kong in one domain, AWS API Gateway in another, and additional platforms elsewhere. This flexibility drives velocity—but it also fragments visibility. Without a unified view of API activity, enterprise teams face inconsistencies in reporting, gaps in customer insights, and difficulty enforcing governance policies.

Ensuring Tenant Scoping in Kong Konnect Using Row-Level Security

In the SaaS world, providers must offer tenant isolations for their customers and their data. This is a key requirement when offering services at scale. At Kong, we've invested a lot of time to provide a scalable and seamless approach for developers to avoid introducing breaches in our systems. In this article, we'll explore the challenges of tenant scoping and how we address them effectively.

DreamFactory Logging Features Explained

DreamFactory simplifies API management with powerful logging tools that boost security, track performance, and ensure compliance. Here's what you need to know: With DreamFactory, you can set up production-ready APIs with detailed logging in just 5 minutes, saving time and costs while maintaining robust security and performance.

What Is Rapid Application Development (Rad)?

Back in our college days, we studied about the Software Development Life Cycle (SDLC), right? In that, we learned about various software methodologies like the Waterfall model, Agile, etc. We also learned how these methodologies help us deliver software quickly. Rapid Application Development is one such methodology we forgot to study in college – no worries, now you can understand what exactly Rapid Application Development is and how it helps you and your business.

How to Setup Observability for your MCP Server with Moesif

The Model Context Protocol (MCP) has taken the internet by storm by rapidly becoming the standard for Large Language Models (LLMs) to communicate with external data sources or tools. MCP provides a structured way to fetch data and trigger workflows through APIs and functions. However, with great power comes great responsibility.

How to Fix the Unsupported Operation Exception in Java

Java throws an UnsupportedOperationException when you attempt to modify an object that was designed to be viewed but not changed. Think of UnsupportedOperationException as trying to open a door with the wrong key. The door exists and looks like any other door, but your particular key (or operation) simply isn't compatible with its lock.