Systems | Development | Analytics | API | Testing

Balancing Innovation and Security With Automation [Destination: Automation]

You feel like you need to clone yourself to scale and maintain security — there simply aren’t enough hours in the year to do it all. Luckily, there’s an automation solution that allows you to get close to cloning how you would normally manage your full API delivery pipeline. Join Peggy Guyott, senior customer experience manager at Kong, and Ned Harris, solutions engineer at Kong, as they share ways you can eliminate the conflict between developers’ need for autonomy and freedom to innovate, and the need to maintain control of governance and security.

How to Make Digital Transformation Work

The best way to appreciate key concepts involving digital transformation is to look at real-world examples. In a recent Kong webinar, I sat down with Solutions Engineer Ahmed Koshok as he reviewed several real-world case studies that help illuminate the role of microservices in making digital transformation successful for organizations. The case studies included Papa John’s, NextJ Systems, and Yahoo! Japan.

Kong-plement Your ServiceHub With a Developer Portal

Two of the best (in my opinion) features in Konnect are the ServiceHub and Developer Portal. However, they’re also two of the most misunderstood. Aren’t they the same thing? Why would you need a ServiceHub vs. Developer Portal? Well, I’m glad you asked! The really quick version is that ServiceHub is like your warehouse, where all your products are stored. It’s a comprehensive collection of everything that you have. Your Developer Portal is more like your storefront.

Minimizing Security Risks in APIs and Microservices

Application Programming Interfaces (APIs) and microservices are the foundational pillars of digital transformation initiatives. They simplify the development process for our technology teams, enabling them to innovate faster, increase customer engagement and boost business agility. However, while this transformation of business digitally opens doors to limitless opportunities, it also opens doors to many challenges – with one of the most significant challenges being security.

Understanding the Basics of Envoy Configuration

Envoy is a key part of a number of service meshes currently on the market, including Istio and the Kuma CNCF Sandbox project. As such, it is often helpful to better understand how Envoy is configured to operate as a data plane in a service mesh. In this session, you’ll learn about the basics of Envoy configuration, like listeners, filters, clusters, and endpoints.