Systems | Development | Analytics | API | Testing

The Cost of Your Legacy System

Companies play smart, and they’re well aware of the disadvantages and risks of keeping legacy systems or outdated technology in their workflow. Despite that, many don’t do anything about it. Why? Because doing nothing affordable. Phasing out a legacy system that your business has relied on for over a decade is a major undertaking. Leaving it in place for as long as possible typically proves more cost-effective than immediate migration, even with potentially severe risks considered.

Kong HQ vs. DreamFactory

The rise in demand for microservices-based applications that rely on APIs for connectivity has triggered an equal rise in demand for API gateway solutions. However, API gateways differ considerably in their features and underlying technology, so it’s important to investigate your selection to ensure it fits your needs. In this guide, we take an in-depth look at Kong and DreamFactory – two of the most advanced API gateway solutions on the market.

Dear Load Balancers,

When I started my journey into Kubernetes, you were always there for me when I needed to expose a service externally. We started small with just exposing one service, and you were dependable and easy to set up. But things have changed. My application has grown, and now the cluster has 10 services that need to be exposed externally. This has made communication difficult. I wonder what will happen when we have 50 services?

7 Approaches to Legacy System Modernization

Legacy system modernization is a hot topic in business strategy right now. As the need increases for new technologies and intelligent business solutions, so too does the need for legacy system modernization. That means upgrading legacy systems, improving existing software, and otherwise bolstering operational efficiency. This article will provide a quick recap of the basics and explain how they fit into a number of legacy system modernization strategies.

How to Secure REST APIs: API Keys Vs. OAuth

REST, a.k.a. Representational State Transfer, is an architectural style commonly used in software development. Applications built via REST-style development tend to be excellent examples of distributed hypermedia applications. However, they don’t often have excellent innate security options. That’s where API keys and OAuth tokens come in. As Dr.

Everything You Need to Know About Identity and Access Management (IAM)

We’re reviewing everything you need to know about identity and Access Management (IAM). Good data governance is the key to success in any industry and you can’t have good data governance without identity and access management software. Identity and Access Management (IAM) solutions, like the software that DreamFactory provides, is essentially a suite of capabilities that enables systems administrators to protect sensitive data. Of course, there’s a lot more to it than that.