Systems | Development | Analytics | API | Testing

A Beginner's Guide to API Data Formats: JSON, XML, Plain Text, and Binary

Imagine you are sending a message to your friend, but you want to ensure that no one else can understand it. So lets say you are encoding your message using a special language that only you and your friend knows. This way, even if someone intercepts the message, they won't be able to understand its true meaning. The encoded message itself is what we call the "payload." In the world of APIs (Application Programming Interfaces), the concept of a payload is quite similar.

A Step-by-step guide to creating production-ready APIs in Go with Gin and Gorm

Take your API development skills to the next level with Go, Gin, JWT, and Gorm. Follow this detailed step-by-step guide to create robust, secure, and production-ready APIs that harness the power of authentication, authorization, and database integration.

How to Fix a SIGILL Kong Crash on Arm64

Kong will crash on the ARM64 platform (the machine with Mac M1/M2 chips or any ARM64 platform). The error message shows the crash is triggered by the SIGILL signal, which means there is an illegal instruction in the Kong binary code. And it turns out to be caused by an error in the LuaJIT ARM64 JIT compiler. This post records how the error is found and fixed.

API Infrastructure is Mission Critical - and Increasingly Under Attack

APIs have revolutionized every industry. They fuel digital transformation and power the web, making up more than 83% of global internet traffic. And API adoption will only grow, with AI, Web3, and decentralization only further driving API usage and integration. But these sometimes-overlooked enablers of connectivity and communication present a serious security challenge: APIs are increasingly in the crosshairs of cyber-attackers.

Documenting APIs on Amazon API Gateway: Code-First or Design-First, The Choice Is Yours

One of the hardest debates is deciding between a code-first API approach or design-first. In an ideal world, we would deliver our APIs at maximum velocity, with minimum maintenance. To maintain the appropriate API consumption, the world has looked at Amazon’s API Gateway as the orchestration of resources to create, deploy, and manage APIs at scale. One of the biggest challenges users face when using any API Gateway is the lack of consistency and standardization throughout the API experience.

Working with APIs

We will be discussing how to work with APIs using WSO2 API Manager in this session. You will learn about Rate limiting policies which would help you to protect your API from exhaustion, how API Policies can help modify your requests and responses and how API versions and revisions can help maintain your API changes. You will also understand about the Lifecycle of APIs, how to perform testing and prototyping when required, how to specify access control and visibility and also about the inbuilt user roles which helps you carry out each of these functionalities easily in WSO2 API Manager.

Legacy to Cloud Migration | The Pros and Cons

Evaluating your business’ legacy to cloud migration strategy is a necessary step for successful digital transformation. Legacy systems are old software applications and infrastructure that are still in use by businesses today. They were often built on outdated technologies and may not be compatible with modern cloud platforms. However, legacy systems can also provide a number of benefits, such as stability, reliability, and familiarity.