Systems | Development | Analytics | API | Testing

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 1: Crawl

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 1: Crawl Brought to you by @KongInc Senior Partner Developer Danny Freese Welcome to the "Crawl" stage of our Cloud Migration Journey! In this tutorial, we will show you how to de-risk and lift-and-shift your connections using Kong Mesh and #Konnect during a migration to the cloud. The "Crawl" stage is the first phase of our 3-phased approach, and it aims to deploy the monolith and Konnect runtime instance, and onboard the monolith to Konnect.

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 2: Walk

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 2: Walk Brought to you by @KongInc Senior Partner Developer Danny Freese Welcome to the "Walk" stage of the Cloud Migration Journey, where we will take you through the second phase of the migration process. In this stage, we will show you how to de-risk and lift-and-shift your connections during the migration process to the cloud using Konnect and Kong Mesh.

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 3: Run

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 2: Walk Brought to you by @KongInc Senior Partner Developer Danny Freese In this video, we'll guide you through the "Run" stage of the cloud migration journey, the final step of our crawl-walk-run tutorial. By this point, you should have already deployed the monolith and Konnect runtime instance, onboarded the monolith to Konnect, deployed the Kong Mesh control plane and the on-prem mesh zone, and reconfigured the Konnect runtime-instance so that runtime-instance monolith communication occurs over the mesh.

The Best Big Data Tools in 2023

Data engineers who work with huge amounts of data know that “big data” is not just an overhyped term. When the volumes of data get into petabytes the best data engineering tools start to break down. This is when you need devoted big data technologies that are fault-tolerant, scalable, and offer high performance even when amounts of data test the limits of your data platform. This article won’t be just another listicle. Instead, we’ll showcase the best big data tools by use case.

How To Improve User Engagement And Retention With Product Analytics?

In the article “From Data to Insights: An Introduction to Product Analytics”, we walk you through the basics of product analytics, providing you with a high-level approach to get started with it. This time, we’d like to dig in deeper to dissect every step of the product analytics process, assuming that the main goal is to improve user engagement and retention.

Data Mesh vs. Data Fabric

In today’s data-driven world, businesses must deal with complex challenges related to managing, integrating, and properly using massive amounts of data housed in multiple locations. Organizations that unlock the right data architectural approach empower themselves with much better decision-making and strategic insights. Two popular approaches — data mesh and data fabric — have surfaced as prominent and innovative solutions for handling data at scale.

Flaky Tests in Software Testing: Causes, Identification, and Best Practices

Flaky tests are one of the most common and frustrating issues in software testing. These are tests that pass or fail sporadically, even if the code being tested has not changed. This can cause confusion and wasted time for developers who are trying to fix issues that may not even exist.

Imperva and Kong Join Forces to Integrate Leading API Management and Cybersecurity Solutions

Today we’re pleased to announce a new strategic partnership and resale agreement with Imperva. Imperva customers will now be able to directly license Kong Enterprise, the fastest, most feature-rich, and secure API management solution. In addition, Kong customers will be able to use the Imperva API Security plugin within Kong Enterprise. This allows developers to comprehensively secure their APIs and protect their business applications and data against unauthorized access.

How to Load Code in Ruby

There are many ways to load code and access file-related constants in Ruby. We can create a clear architecture by separating and handling concerns into classes and pulling in only the classes we depend on. Many full-stack frameworks like Rails and Hanami offer a built-in method to access the classes we want, as long as we stick with a certain convention. How does this work? In this post, we will explore three different options for loading code: using load, require, and autoload.