Systems | Development | Analytics | API | Testing

Latest Videos

How Papa John's Fast-Tracked External API Innovation With Kong

To keep pace with the company’s rapidly growing menu innovation strategy and expansion to digital channels, elevating the API strategy became a priority at Papa John’s. Learn how the team reduced time to market and enabled API innovation with the growing list of external channels. This session will discuss deploying Kong in a hybrid environment, making use of the Kong Developer Portal and integrating to a CI/CD pipeline to automate deployments.

How to Achieve Zero-Trust Security With Service Mesh | Kong Summit 2020

Are you an enterprise architect who is currently facing the challenge to secure and observe service connectivity across every cloud and every cluster? Kong Mesh, built on top of CNCF’s Kuma and Envoy, is a universal service mesh tailored to the enterprise architect that must provide modern and secure connectivity to the applications that the teams are building.

Infrastructure and Software Development: What Got Us Here Won't Get Us There

In this fireside chat, industry leaders with experience driving revolutions in software development and infrastructure will discuss transitions to microservices, Kubernetes, cloud native and open source across industries. The panel will also discuss how requirements have changed, and what paths these technologies and architectures could take in the future.

Learnings from CNCF's Envoy and OPA Creators Matt Klein and Tim Hinrichs

Applications architected as microservices are becoming more prevalent every day, but just like their monolithic ancestors, microservice applications must adhere to organization-wide constraints around compliance, security, performance, etc. Authorization — controlling which people and machines can perform which actions — is a foundational security problem that requires new solutions in a microservice world because of changes in requirements around performance, availability and even where authorization gets enforced architecturally.

Microservice Authorization with Open Policy Agent and Kuma | Kong Summit

Applications architected as microservices are becoming more prevalent every day, but just like their monolithic ancestors, microservice applications must adhere to organization-wide constraints around compliance, security, performance, etc. Authorization, controlling which people and machines can perform which actions, is a foundational security problem that requires new solutions in a microservice world because of changes in requirements around performance, availability, and even where authorization gets enforced architecturally.

Modern Data Architecture to Support Healthcare During a Pandemic and Beyond | Kong Summit 2020

COVID-19 has hit our country hard, and the healthcare industry is still reeling from national attention on the blatant disparity of the effects of COVID-19 in specific underserved populations. Recognizing the disparity, healthcare leaders continue to struggle with interoperability and data sharing; we must free the data and move beyond the debate of public or private cloud. It’s time to prepare for the eventuality of leveraging all available cloud environments to handle the data workload and application needs to end digital disparity in healthcare.

Powering your APIs with Kong and AWS Lambda

While the concept of serverless applications has grown over the past years there are plenty of instances where the serverless model doesn’t fit all needs. For those coming from on-premises or hybrid scenarios, moving to serverless might look like needing to move everything or building very differently than you have in the past. In this session we’ll demystify the central component of the serverless movement, AWS Lambda, a serverless compute service that changes how applications are built and managed, but only in some ways.