Systems | Development | Analytics | API | Testing

Top Microservices Examples & Guides - DreamFactory

DreamFactory is a secure, self-hosted enterprise data access platform that provides governed API access to any data source, connecting enterprise applications and on-prem LLMs with role-based access and identity passthrough. During the last 10 years, microservices-based applications have benefited global enterprises by providing them with massive scalability, greater agility, more highly available systems, and improved operational efficiency.

Running Kafka in Kubernetes: What We Learned

Apache Kafka is mission-critical for many organizations—but where you deploy it matters just as much as how you use it. In this video, two OpenLogic experts discuss why they increasingly encourage customers to move their Kafka clusters to Kubernetes and utilize the Strimzi operator, and what that shift unlocks from an operational, scalability, and resilience standpoint.

Common Kafka Anti Patterns and How to Avoid Them

Kafka is powerful—but common Kafka mistakes can quietly undermine performance, reliability, and scalability. In this video, two OpenLogic experts break down the most frequent Kafka anti-patterns they see in real customer environments—and how to avoid them. Based on hands-on experience fixing production Kafka clusters, this discussion covers: If you’re running Apache Kafka in production—or planning to—this video will help you spot Kafka mistakes early and apply proven best practices to build a more stable, scalable event streaming platform.

Building Bitrise's AI platform: Scaling AI features across teams

This is the fourth and final installment in our series about bringing AI to Bitrise. In Part 1, we explained why we built our own AI coding agent. Part 2 covered our browser-integrated AI Assistant. Part 3 detailed how we brought AI to the Bitrise Build Cloud. In this final post, we'll explore how we unified these efforts into a cohesive AI Platform.

Multi-agent AI systems need infrastructure that can keep up

When you're building agentic AI applications with multiple agents working together, the infrastructure challenges show up fast. Agents need to coordinate, users need visibility into what's happening, and the whole system needs to stay responsive even as tasks branch out across specialised workers. We built a multi-agent travel planning system to understand these problems better. What we learned applies well beyond holiday booking.

From Strategy to Action: See Konnect Metering & Billing in Motion

See how easily Konnect Metering & Billing transforms API and AI traffic management into new revenue streams. We've talked about why 2026 is the year of AI unit economics. There, we explored the "2025 hangover" where organizations realized that without financial governance, AI isn't just a science project but has become a margin-bleeding cost center. But "governance" and "monetization" shouldn't just be buzzwords in a resolution; they need to be part of your active infrastructure.

Kong Mesh 2.13: Mesh Identity Support for Universal Mode & LTS

Today, we're excited to announce Kong Mesh 2.13. Kong Mesh 2.13 delivers full support for Mesh Identity for Kubernetes and Universal mode. Plus, it's been designated as a Long Term Support release, with support for a total of 2 years. But first, what's Kong Mesh for the uninitiated?

Resolved: GPG Signature Warnings on Debian 13 and Modern Ubuntu

If you’ve recently upgraded to Debian 13 (“Trixie”) or a newer version of Ubuntu and suddenly started seeing security warnings when running apt update (or apt update --audit), don’t worry. You didn’t do anything wrong. This is a side effect of a broader security change across modern Linux distributions. SHA-1 signatures are being deprecated, and repositories that still rely on them may now trigger warnings or audits.

Why AI Agents Need Their Own Identity: Lessons from OWASP's MCP Security Guide

The recently released OWASP, “A Practical Guide for Securely Using Third-Party MCP Servers,” highlights a fundamental challenge in modern AI deployments: how do we govern, secure, and audit systems that are inherently non-deterministic? Unlike traditional, static software, AI agents dynamically adapt their execution paths, tool selection, and decisions based on context and real-time resources, allowing the same agent to achieve identical goals through entirely different approaches.