Systems | Development | Analytics | API | Testing

Latest Blogs

Software Testing Errors to look out for (with examples)

The software will never be bug-free. But, it’s important to minimize the number of bugs such that the impact on functionality and user experience of an application is minimized. Bugs could come up due to different reasons, in this article, we will discuss them from the perspective of software errors. These are the errors that also need attention during the testing phase.

"Gateway Mode" in Kuma and Kong Mesh

One of the most common questions I get asked is around the relationship between Kong Gateway and Kuma or Kong Mesh. The linking between these two sets of products is a huge part of the unique “magic” Kong brings to the connectivity space. In this blog post and the video below, we’re going to jump right into breaking down the relationship between these products and how you can use them together. First, let’s break down a couple of the terms that are involved.

Containerization in a Cloud Native World: An Interview With Reza Shafii

Multi-cloud infrastructure is changing the way companies approach their software architecture. What started solely as gateway traffic management has evolved into full lifecycle API management. I recently sat down with Reza Shafii, Kong’s VP of product, for a blog series where we explore how full lifecycle service management ties into the concept of cloud native.

SMTP Ports (25, 587, 465, or 2525) - What is SMTP Port? How to Choose the Best and Right SMTP Port?

It can be difficult to choose an SMTP port. When we set up the Simple Mail Transfer Protocol SMTP Server, the first question that comes to mind is this. Which port is the best for SMTP connections? There are a variety of ports to choose from, but which one should you use? Allow me to take you on a journey through the history of each port. It will give you a good understanding of all of the ports, and then we'll talk about which one is optimal for SMTP connections.

How Data Meets Software Development And Debugging

There’s no doubt about it: data is the new gold. The last decade has created a revolution in everything related to data, whether it’s the creation of huge amounts of data or anything related to consumption, collection, processing, analysis, and decision making. In my previous experience as a data scientist, I can say that algorithms; whether a simple algorithm or an extremely complex neural networks model; as good as they may be, cannot beat bad data.

5G Meets Low-code: Innovation Backbone for the Post-COVID World, Part 1

They tell us 5G is the future. Where business and consumers are going. But the fierce battle for early adopters is already underway according to Peter Linder, a notable 5G evangelist and Head of 5G Marketing for Ericsson in North America. “Early adopters are getting on board right now,” says Linder. “About 54 million Americans will purchase a 5G phone by the end of 2021. It’s not like ‘build the network and they will come’.

Anodot vs. AWS: Which Has the Most Accurate Cloud Cost Forecasts?

The move to cloud computing has been a no-brainer for many enterprise companies. But cloud computing is an expense that, unlike many other operating costs, is largely variable. Many companies — including the fastest-growing startups, largest enterprises, and leading government agencies — choose AWS to help them streamline fragmented processes, reduce costs, become more agile, and innovate faster.

BI Compliance: Can a Restructure Deliver Enhanced Data Privacy?

Every data-driven business is terrified of the prospect of a data breach. Exposing sensitive data could mean reputational damage, loss of clients, and heavy fines under emerging privacy laws. But every data-driven business also wants to make use of its data. Business intelligence (BI) platforms allow anyone to build complex and detailed dashboards that help them understand the organization’s current state. How do you resolve this tension? One approach is to build a privacy-first data structure.

ELT: Easy to Deploy, Easy to Outgrow

Extract, load, transform (ELT) technology is a type of data pipeline that ingests data from one or more sources, loads the data into its destination (typically a data lake), and then allows end-users to perform ad-hoc transformations on it as needed. ELT can perform mass extraction of all data types, including raw data, without the need to set up transformation rules and filters before data loading.