Systems | Development | Analytics | API | Testing

Ace software testing compliance with Xray - Part 1

Every industry has evolved to require high-quality products that are safe for usage according to the applicable rules. Those often appear as international standards that provide a framework for applying the global best practices from operational, ethical, and legal standpoints. Therefore, the primary benefits of aligning with those guidelines are reputational and financial gains.

How To Use Zig for Elixir NIFs

Elixir excels at building scalable and maintainable applications. However, sometimes Elixir is not the best language to tackle specific tasks, and it can fall short in some areas, like direct system interaction. Fortunately, Elixir offers NIFs (Native Implemented Functions): a path for integrating with other languages to improve these gaps.

Boost Your Business with Secure SFTP File Sharing

Secure FTP (SFTP) is a powerful protocol that businesses can use to improve collaboration, increase efficiency, and safeguard sensitive information. By using SFTP, businesses can securely transfer files between users and locations, regardless of their network or device type. This can help improve productivity and protect sensitive data from unauthorized access. In this article, we’ll discuss what is SFTP, how it works, its benefits, and how to set up SFTP for your business.

Docs as Code: Screenshot Automation at Kong

Imagine this: You're documenting an unreleased feature, and your documentation requires screenshots. However, you're working in an internal environment that includes features you don't want to reveal to the public. What do you do? We faced this exact situation during the API Summit release when we needed to capture screenshots of the new Kong Konnect Plus dashboard while our internal environment also showcased Mesh Manager features.

Getting Started with Generative AI

It's not hard, it's just new. How can you, your business unit, and your enterprise utilize the exciting and emerging field of Generative AI to develop brand-new functionality? And once you’ve figured out your use cases, how do you successfully build in Generative AI? How do you scale it to production grade?

API Security Fundamentals: Everything You Need to Know

You’ve probably heard of the Internet of Things (IoT); all those everyday objects that incorporate computing functions. For example, the IoT allows you to connect your phone to your refrigerator. This way, you can know exactly what to buy at the supermarket for that impromptu dinner that night. Perhaps you’re part of a DevOps team, using microservices and containers to build and deploy legacy and cloud-native applications quickly and iteratively.

Call a PostgreSQL Stored Procedure from an API

The ability to call a PostgreSQL stored procedure from an API allows for rapid development in a secure way. Rather than writing database queries to interact with your data you can utilize an API that can be rapidly developed and reused many times. The reusability of APIs and using stored procedures means if you are scaling from a single backend application to hundreds your APIs will not change. Table of Contents.

Tech in Business: Benefits of Outsourcing Cybersecurity Solutions to MSPs

In today's fast-paced digital landscape, technology has become an integral part of daily business operations. From managing internal processes to customer interactions, technology plays a critical role in ensuring a company's success. However, as technology evolves, so do the threats that businesses face.