Systems | Development | Analytics | API | Testing

In the Quest for Success, Never Stop Being Curious With Data

My whole life I’ve been curious. You have to be, to become an entrepreneur. I’m curious about trends, about looking at data and finding patterns, which might show you where the next opportunity lies. And, as I discussed with Joe DosSantos in the latest episode of Data Brilliant, I’m a big believer in experimentation and learning by putting the data and analysis into practice.

Balancing Innovation and Security With Automation

Automating digital transformation API deployments can help speed time to market and minimize the resources required for the deployments — if developers can be assured that the automated process meets all necessary security requirements. It’s a topic that Kong Senior CustomerExperience Manager Peggy Guyott and Kong Senior Solutions Engineer Ned Harris discussed on a recent webinar as part of the Destination: Automation 2021 digital event.

Why you need to build globally distributed applications

Today's users of web and mobile applications and services expect fast and outstanding experiences. Delivering successful web services and applications means meeting these baseline expectations: In this blog post, we dive into why these three goals are vital to modern web applications and services. Then, we will look at how building global and distributed architectures achieve these goals.

PHP Handlers: Why They Matter and How to Choose the Best One

In obsessing over the best frameworks and coding practices for their PHP applications, developers often fail to look beyond their code for optimization and boosting performance. They often fail to realize the crucial role of the server setup, the PHP handlers, and the system environment in your application failing or succeeding out there. Apache server and web hosting manager (WHM) configurations can seem obscure at first, and it’s challenging to keep track of every config option.

Authentication and Authorization for RESTful APIs: Steps to Getting Started

Why do APIs require authentication in the first place? Users don't always need keys for read-only APIs. However, most commercial APIs require permission via API keys or other ways. Users might make an unlimited number of API calls without needing to register if your API had no security. Allowing limitless requests would make it impossible to develop a business structure for your API. Furthermore, without authentication, it would be difficult to link requests to individual user data.

Which Stitch Alternative Should You Choose? Top 7 Stitch Alternatives

Stitch is a popular cloud-based Extract, Load, Transform (ELT) tool. Stitch seamlessly moves data between databases, warehouses, data lakes, SaaS services, and other applications with no code required whatsoever, making it a valuable weapon for data integration. However, the platform has limited data transformation capabilities and, away from its free tier, charges users for the amount of data they use per month, which often works out to be more expensive than other pricing models in the ETL/ELT space.