Systems | Development | Analytics | API | Testing

Creating Custom Exceptions in Elixir

Exceptions and exception handling are widely accepted concepts in most modern programming languages. Even though they're not as prevalent in Elixir as in object-oriented languages, it's still important to learn about them. In this article, we will closely examine exceptions in Elixir, learning how to define and use them. Let's get started!

WSO2 API Manager: Leading the Way in API Management and Security

API management and API security are like two sides of a coin, intrinsically part of a greater whole. That is why the recent KuppingerCole report, “Leadership Compass: API Security and Management,” is particularly useful for organizations seeking to develop or update their API strategies. With the report’s comprehensive view of both API management and security, it offers an invaluable resource for understanding their interplay.

What's New in Kong Gateway 3.6

Kong Gateway 3.6 delivers a variety of new capabilities, enhanced UX and a brand new feature that we can't talk about yet. There are new Consumer Group capabilities, increased security when working with Hashicorp Vault or OpenID Connect, and there will even be a live demo of the brand new feature. Join Michael Heap (Sr Director of Developer Experience) and Veena Rajarathna (Staff Product Manager) as they walk you through what's new in the 3.6 release. You don’t want to miss this session!

Avoiding Bugs in Range-Based For-Loops with MISRA C++:2023

MISRA C++:2023®, the next version of the MISRA C++ standard, is here! To help you understand the changes between MISRA C++:2023 and the previous version, we continue our blog series by Perforce Principal Technical Support Engineer, Dr. Frank van den Beuken, with this third installment. In the first two blogs, we introduced you to the new MISRA C++ standard and the history of C++. In this blog, we take a closer look at a specific rule centering on for-loops in C++.

Canary Testing: A Comprehensive Guide For Developers

Imagine you’re a miner with a canary in a cage. If the air is toxic, the canary reacts first, giving you a heads-up. Canary testing works in a similar fashion for your software. Instead of releasing the whole flock (users) into a potentially toxic or buggy environment, you release just one canary (a small subset of users) to test the waters.

Creating a Microsoft SQL Server API in Less Than 5 minutes with DreamFactory

Do you have a ton of data sources and do not know how to expose them? Do you know you need a Microsoft SQL Server API but don’t know where to begin to build it? Look no further, DreamFactory can take any database and generate a fully documented and secure REST API faster than making a sandwich. All you need is your database credentials and DreamFactory will handle the rest, instantly generating Swagger API documentation and securing your API by way of API keys.

Adopt a Zero Trust Approach with OAuth 2.0 Mutual TLS Client Authentication

In the modern IT stack, API gateways act as the first line of defense against attacks on backend services by enforcing authentication/authorization policies and validating and transforming requests. When backend services are protected with a token-based approach, client applications must obtain an access token to access the protected resource.

Kong Konnect Data Plane Node Autoscaling with Cluster Autoscaler on Amazon EKS 1.29

After getting our Konnect Data Planes vertically and horizontally scaled, with VPA and HPA, it's time to explore the Kubernete Node Autoscaler options. In this post, we start with the Cluster Autoscaler mechanism. (Part 4 in this series is dedicated to Karpenter.)

Snowflake vs. Oracle: Which Data Warehouse is Better?

Snowflake and Oracle Autonomous Data Warehouse are two cloud data warehouses that provide you with a Single Source Of Truth (SSOT) for all the data that exists in your organization. You can use either of these warehouses to run data through business intelligence (BI) tools and automate insights for decision-making. But which one should you add to your tech stack?