Systems | Development | Analytics | API | Testing

%term

Continual is SOC 2 compliant

Continual is proud to announce that we are now SOC 2 Type 1 compliant and SOC 2 Type 2 in progress. This certification demonstrates our core commitment to your data security and privacy. We expect to make additional announcements around our security certification efforts over the coming months. Beyond third party attestations, Continual is built from the ground up for data security, privacy, and governance at enterprise scale.

What is an Unhandled Exception and How to Find Them

An exception is a known type of error. An unhandled exception occurs when the application code does not properly handle exceptions. For example, When you try to open a file on disk, it is a common problem for the file to not exist. The.NET Framework will then throw a FileNotFoundException. This is a simple example of a potential known problem that is accounted for within the code. Let’s take this code sample below.

The AI Hallucination Problem: How to Protect Your Work

Artificial intelligence has been instrumental in helping businesses streamline and speed up business operations by automating repetitive tasks. It also frees up workers to focus on higher-level tasks that require human intervention. And when paired with other intelligent automation tools, such as robotic process automation, it can improve business processes and provide a competitive advantage.

Introduction to Ozone on Cloudera Data Platform

When considering whether Ozone is the right fit for your company, view it from several different angles. You can look at it from the perspective of Lower TCO, or reducing the carbon footprint of your Data Center. Other things to consider are how much your data is increasing and at what rate, and if you have enough hardware to cover that growth.

What is the Event Sourcing Pattern? | Designing Event-Driven Microservices

Event Sourcing is a pattern of storing an object's state as a series of events. Each time the object is updated a new event is written to an append-only log. When the object is loaded from the database, the events are replayed in order, reapplying the necessary changes. The benefit of this approach is that it stores a full history of the object. This can be valuable for debugging, auditing, building new models, and a variety of other situations. It is also a technique that can be used to solve the dual-write problem when working with event-driven architectures.

Leap Forward with Kong Gateway Enterprise 3.6

We're thrilled to announce the general availability of Kong Gateway Enterprise 3.6. This version brings security, efficiency, and standards conformance to enterprise applications. Plus, Kong AI Gateway, which you can learn more about here. Let’s dive into the enhancements and explore the tangible benefits these features bring your organization.

Announcing Kong's New Open Source AI Gateway with Multi-LLM Support, No-Code AI Plugins, Advanced Prompt Engineering, and More

Today I’m excited to announce that Kong has released six new open source AI plugins in Kong Gateway 3.6 that turn every Kong Gateway deployment into an AI Gateway. These new plugins are available today and are entirely free and open source for everyone. The six new plugins are AI Proxy, AI Request/Response Transformer, AI Prompt Guard, AI Prompt Template, and AI Prompt Decorator.