Systems | Development | Analytics | API | Testing

%term

January Online Meetup - Kong for Kubernetes 0.7

We announced the latest release of Kong for Kubernetes! Features include encrypted credentials, mutual authentication using TLS, native gRPC routing, performance improvements among other things. With this release, Kong for K8s now has 100% coverage of Kong Gateway’s administrative API functions. This means that all the features of the Kong Gateway can now be used natively on Kong for K8s through Kubernetes resources.

Using Selenium IDE Record and Playback tool

Selenium IDE is an open source record and playback tool used. Easy to use and fast in generating UI functional test cases. End to End testing is quite fast when you create tests from the Selenium IDE Chrome Extension or Firefox Add-on. Debugging tests, setting breakpoints, running an UI test to a specific test step work out of the box the new version of Selenium IDE. Test suites are available in order to group previously generated test cases, and exporting your test cases is a click of a button away.

Kuma 0.3.2 Released with Kong Gateway Support, Prometheus Metrics and GUI Improvements!

Happy New Year! To kick off 2020, we’re proud to announce Kuma’s 0.3.2 release that includes long, anticipated features. The most prominent one is Kong Gateway support for ingress into your Kuma mesh. Another exciting feature that was widely requested is Prometheus support, which will enable you to scrape your applications’ metrics. Lastly, we announced the Kuma GUI in the last release. Thanks to a lot of early feedback, we’ve added many exciting improvements in this release.

How Businesses are Using Machine Learning Anomaly Detection to Scale Partner and Affiliate Tracking

Today’s business needs make it virtually impossible to function without relying on an extensive network of partners and third-party providers. An IBM study found that 70 percent of businesses were looking to increase their external partnerships.

5 Best Security Practices for Tomcat Servers

Tomcat servers are widely used application servers for today’s development architectures, popular for hosting Java based applications. Below is a guide on best security practices for security your Tomcat Server environment. Banner grabbing is the process of gaining information from computer systems including services, open ports, version, etc. When sending a server host request via telnet command, you pass along the server name, port, and version.

Like the Infinity Stones, keep your Talend services as far apart as possible

Ok, so we all probably know why keeping all Infinity Stones in one place is a bad idea, right? You must now be wondering what the relationship between Infinity Stones and Talend could be. Worry not, Thanos isn’t coming and there is a reasonable explanation behind the MCU fandom references, I promise.

Placing the Emphasis on Data in the Federal Data Strategy

In mid-June of 2019, the White House Office of Management and Budget (OMB) released the Draft 2019-2020 Federal Data Strategy Action Plan. The plan outlines a series of steps and principles targeting effective governance, responsibilities and best practices for federal agencies’ use of citizen data. When put into place, these action items will allow government agencies to maximize data, improve security and better serve constituents.