Systems | Development | Analytics | API | Testing

MCP Server Integration: One Month of AI-Powered Data Engineering

When we officially launched our Model Context Protocol (MCP) server integration on June 12, 2025, we weren't just adding another feature - we were fundamentally changing how data engineers interact with their tools. One month later, the transformation has exceeded our wildest expectations.

AI That Works: The CFO's Guide to Smarter, Faster Finance

The hype around AI in finance is everywhere—but what actually works? In this short video, we explore Agentic Workflows: AI-driven systems that empower CFOs to make faster, smarter decisions without the noise. Learn how insightsoftware is helping finance teams automate intelligently and scale with confidence.

Ricoh's AI-Powered Transformation: A Seamless User Experience with ThoughtSpot

Discover how @ricoheurope transformed its user experience with ThoughtSpot Embedded Analytics! In this video, Ricoh's Director of Innovation shares how our developer-friendly embedding creates a seamless, branded look, and how the Spotter AI Agent empowers users to get instant data insights, freeing up internal teams.

Kong AI Gateway: Prompt Compression

High token consumption from long prompts can degrade model performance and lead to expensive, inefficient LLM operations. This video demonstrates how to solve that problem using Kong's AI Gateway. AI Prompt Compressor Plugin: See how this plugin intelligently compresses incoming prompts before they hit the model. It summarizes context, removes redundant information, and trims excess tokens—all while preserving the original meaning.This could lead to significant cost savings and improved performance.

TCP Proxy: Expose TCP Ports Publicly

Today, we’re announcing the public preview of TCP Proxy — a new way to expose TCP ports publicly. Until now, services on Koyeb could only be publicly exposed via HTTP, HTTP/2, WebSocket, and gRPC protocols. TCP-based workloads were limited to private access within the mesh network for service-to-service communication. With TCP Proxy, that changes. You can now make any TCP service publicly accessible with minimal configuration.

How to Build a Multi-LLM AI Agent with Kong AI Gateway and LangGraph

In the last two parts of this series, we discussed How to Strengthen a ReAct AI Agent with Kong AI Gateway and How to Build a Single-LLM AI Agent with Kong AI Gateway and LangGraph. In this third and final part, we're going to evolve the AI Agent with multiple LLMs and Semantic Routing policies across them. In this blog post, we'll also explore new capabilities introduced in Kong AI Gateway 3.11 that support other GenAI infrastructures.

Ep 33 | AI Means Nothing If You Don't Know Why You're Using It with Cassie Kozyrkov

In the race of not being left behind in adopting new technology—like AI—enterprises often overlook the most straightforward, strategic question: what decision are we trying to make? Cassie Kozyrkov, first and former Chief Decision Scientist at Google and founder of Kozyr, joins The AI Forecast to reframe the conversation. Her take? It’s not about the genie granting the wish—in this case, AI; it’s about the wisher.

Tired of Surface-Level Analytics? Yellowfin's AI Powered Insights Gives You the Full Picture

Have ever opened up a dashboard or report, and not known where to start exploring? Finding meaningful conclusions from a sea of charts and tables can be challenging and time-consuming. It's not always easy to see and understand the story your data is trying to tell, especially when you’re presented with a lot of information at once.

Bitrise maintains SOC 2 Type II compliance with latest successful assessment

At Bitrise, we continually invest in security best practices to ensure that our customer’s data stays safe and secure. As a part of an on-going effort, we are excited to announce that we’ve successfully completed our SOC 2 report. The examination was conducted by A-LIGN, a technology-enabled security and compliance firm trusted by more than 4,000 global organizations to help mitigate cybersecurity risks.