Systems | Development | Analytics | API | Testing

How PIM Integrations Benefits From ERP

Every system has different functions, some of them can be integrated to bring bigger solutions to businesses, specially for those that manage a big amount of data. In case of eCommerce businesses, information has to be integrated within many systems, such as ERP, so it will be accessible with in the company’s logistic processes.

Kong Konnect Updates: Increased Security and Streamlined API Management

We’re excited to announce new features in Kong Konnect, including the ability to take advantage of identity management APIs, streamlined certificate management, and latency metrics as part of Analytics. Read on to learn about these features and how kong helps future-proof API security.

Not All MFA is Created Equal, Especially in CIAM

Since October is cybersecurity awareness month, it’s a great time to revisit the question of what are the best ways to secure user authentication in CIAM. In many industries (finance and healthcare, to name a few), regulations require the use of multifactor authentication (MFA) to protect access to sensitive data and transactions.

The Power of Unlocking and Unifying Data

Every day, humans produce 2.5 quintillion bytes of data. Just to put that number into perspective, there are 18 zeros in a quintillion. Unifying data can allow you to take advantage of it and benefit your business. The vast majority of organizations have collected nearly endless amounts of data. Yet, these same organizations are starving for information that can be used to make more informed decisions. Information may be stored in databases that don’t talk to each other.

Preventing PII in Test environments

Data privacy and security are a top concern for most organizations. It’s easy to see why given changes over the past few years. These types of protections can be great for us as consumers. However, they also make it extremely difficult to create realistic production simulations in pre-production. It’s hard to rapidly develop new applications if you can’t iterate against realistic data.

Using Apache Solr REST API in CDP Public Cloud

The Apache Solr cluster is available in CDP Public Cloud, using the “Data exploration and analytics” data hub template. In this article we will investigate how to connect to the Solr REST API running in the Public Cloud, and highlight the performance impact of session cookie configurations when Apache Knox Gateway is used to proxy the traffic to Solr servers. Information in this blog post can be useful for engineers developing Apache Solr client applications.

Introducing Kong Gateway Operator

Kong Gateway Operator is a next-generation deployment mechanism founded on the operator pattern that allows Kong Gateways to be provisioned in a dynamic and Kubernetes-native way, enabling automation of #Kong cluster operations and management of the Gateway lifecycle. In this video @Viktor Gamov , a principal developer advocate with @Kong demonstrates how to install Kong Gateway Operator, how to enable HTTP routes and how to upgrade Kong Gateway in seconds without downtime.

Surviving the API Security Apocalypse

With more and more businesses transforming themselves digitally, it has become critical to secure your APIs. An insecure API is an easy target for attackers to gain access to an otherwise secure computer or network. We invite you to learn about API security best practices to protect against cyberattacks, API misuse, data breaches, and zombie APIs.

From Data Lake to Data Mesh: How Data Mesh Benefits Businesses

Current data architecture is going through a revolution. Enterprises are starting to shift away from the monolithic data lake towards something less centralized: data mesh. Data mesh is a relatively new concept, first coined in 2019, that addresses potential issues with data warehouses and data lakes that can cause businesses to be slow, unresponsive, or even suffer from data silos. Data mesh benefits are able to provide a wealth of advantages to your business.