Systems | Development | Analytics | API | Testing

Conference

Learnings from CNCF's Envoy and OPA Creators Matt Klein and Tim Hinrichs

Applications architected as microservices are becoming more prevalent every day, but just like their monolithic ancestors, microservice applications must adhere to organization-wide constraints around compliance, security, performance, etc. Authorization — controlling which people and machines can perform which actions — is a foundational security problem that requires new solutions in a microservice world because of changes in requirements around performance, availability and even where authorization gets enforced architecturally.

Microservice Authorization with Open Policy Agent and Kuma | Kong Summit

Applications architected as microservices are becoming more prevalent every day, but just like their monolithic ancestors, microservice applications must adhere to organization-wide constraints around compliance, security, performance, etc. Authorization, controlling which people and machines can perform which actions, is a foundational security problem that requires new solutions in a microservice world because of changes in requirements around performance, availability, and even where authorization gets enforced architecturally.

Modern Data Architecture to Support Healthcare During a Pandemic and Beyond | Kong Summit 2020

COVID-19 has hit our country hard, and the healthcare industry is still reeling from national attention on the blatant disparity of the effects of COVID-19 in specific underserved populations. Recognizing the disparity, healthcare leaders continue to struggle with interoperability and data sharing; we must free the data and move beyond the debate of public or private cloud. It’s time to prepare for the eventuality of leveraging all available cloud environments to handle the data workload and application needs to end digital disparity in healthcare.

Practical Implementation of Good Security Hygiene for Mobile Apps | Kong Summit 2020

We all know that we shouldn’t store secrets in mobile apps, but what is the practical alternative? We all know that we should use certificate pinning for our APIs, but how can it be done simply and safely? This talk will describe a real project to explore some of the challenges of implementing good security practice in a large organization and discuss a third-party solution (Approov) which addresses both of the issues above in a relatively simple way using industry standards and working neatly with Kong.

Simplifying Canary Deployment | Ingenia | Kong Summit 2020

Canary deployment is a helpful tool that allows companies to put in production multiple versions of its products to control flow and access based on different sets of rules, clients, amounts and operations. In this session, we will discuss best practices for canary deployment and share our experiences using Kong Enterprise — supported by Kuma capabilities — in achieving this.

Taylor Brown and George Fraser, Co-Founders of Fivetran, keynote the Modern Data Stack Conference

Throughout time data has improved the way we approach problems, find new discoveries, and make decisions. The technology that powers the creation and analysis of data hasn't always been reliable or simple to use, leaving some organizations ahead of others. This is disparity between the haves and have nots of data is changing due to the modern data stack. In this session, Taylor will give us a warm welcome and George will explain the impact of the modern data stack for analytic teams and how it is becoming as simple and reliable as electricity.