Systems | Development | Analytics | API | Testing

Kong AI Gateway 3.11: Reduce Token Spend, Unlock Multimodal Innovation

Today, I'm excited to announce one of our largest Kong AI Gateway releases (3.11), which ships with several new features critical in building modern and reliable AI agents in production. We strongly recommend updating to this version to get access to the latest and greatest that AI infrastructure has to offer.

Beyond console.log: Smarter Debugging with Modern JavaScript Tooling

Ask any JavaScript developer their most used debugging tool and chances are the answer will be console.log. It’s immediate, low friction, and available in every browser. For development, it’s fantastic. But for production and complex applications, if you rely on console.log alone, cracks begin to show. It lacks context, doesn’t persist, and makes reproducing or analyzing user-reported issues a challenge. In this article, we’ll look at smarter, scalable debugging strategies.

How to Avoid N+1 Queries in Django Python

Django is a powerful web framework that simplifies how developers interact with databases through its Object-Relational Mapping (ORM) system. However, even with its benefits, it’s easy to fall into performance pitfalls such as the N+1 query problem. In this article, we’ll explore what N+1 queries are, why they can be an issue for your application, and how to mitigate them using Django’s best practices. Let's dive in!

The Benefits of Continuous Integration: A Guide to Streamlining Your Business

DevOps is the delivery process that focuses on the cross-functional approach of building and shipping applications in a faster manner through automation of infrastructure, workflow as well as performance evaluation. One of the most essential components of DevOps is CI/CD, which acronym for continuous integration (CI) and continuous delivery (CD).

Blueprint for Enterprise GenAI: Governance, Gateways, and Guardrails

Generative AI is transforming how businesses operate, with 74% of enterprises already deploying it in production by 2025. The technology offers measurable benefits like a 1.7x ROI and cost reductions of 26–31% in key areas like supply chain and customer operations. But with rapid adoption comes serious risks - data breaches, AI bias, and compliance issues are top concerns.

Understanding The Differences Between Windsurf And Cursorai

In 2025, AI-powered coding platforms have rapidly moved from "nice to have " to an important part of modern developers. The tools that caught everyone’s attention in these are Windsurf and Cursor. It is hard to choose between the Windsurf vs cursor – they are mostly similar. They are both IDEs (integrated development environments) which are mostly developed for the vibe coders, i.e. non non-coders who build apps for fun and work.

An Open Letter to Informatica Customers

Over the past few weeks, I’ve spoken with a number of leaders who are digesting Salesforce’s move to acquire Informatica and what it will mean for them. If you are doing the same, I get it. Informatica has been an established company but in recent years pushing customers to move to their cloud only platform, will this accelerate this in particular with their recent PowerCenter end-of-support news?

Advanced Strategies to Deploy Phoenix Applications with Kamal

In the first part of our series, we explored how Kamal simplifies Docker-based deployments while providing a cloud-like developer experience. We covered the basics of containerizing Phoenix applications, configuring Kamal, managing secrets, and implementing a CI/CD pipeline for automated deployments.

Monitoring MCP Security and Agent Behavior with Moesif

The Model Context Protocol (MCP) has pioneered a new interface layer between AI agents and tools. It has become easier to enable seamless access to external services, APIs, workflows, and data with natural language. MCP servers are now powering the decentralization of AI intelligence and orchestrating the interplay among modern AI systems. In doing so, they also introduce a more open, fluid, and automation-driven attack surface. However, traditional API security models weren’t built for this.