Systems | Development | Analytics | API | Testing

MySQL API: What It Is and How to Create One in Minutes

Modern software development requires applications to interact with databases to retrieve and modify data. According to Statista, MySQL ranks among the most popular open-source Database Management System (DBMS). With such widespread usage, there’s a need to ensure smoother and faster interactions between applications and MySQL databases. Enter MySQL APIs. MySQL APIs eliminate the effort involved in coding or using other database management tools.

Ssl Problem "Unable To Get Local Issuer Certificate"

In this age of modern era, where privacy is one of the biggest concern SSL/TLS certificates plays a vital for secure communication over the internet. They encrypt data, ensuring it is transmitted securely between servers and clients. However, while working with SSL/TLS, you may encounter the "Unable to Get Local Issuer Certificate" error. So let’s try to understand why this error comes and what is SSL/TLS.

3 Strategies to Supercharge Developer Operational Efficiency

Developer operational efficiency is crucial for streamlining API management processes and empowering development teams to work more effectively. In this blog post, we'll explore three key tips to unlock developer operational efficiency — leveraging API documentation and self-service credential management, automating API lifecycle management, and optimizing resources and performance — using Kong Konnect and Kong Kubernetes Ingress Controller (KIC).

Mastering Your API Contract: A Guide to Establishing Clear Guidelines and Expectations

Are you seeking to ensure robust communication between APIs and applications? Contract testing plays a crucial role in ensuring this robust communication. The key lies in the API contract. Serving as a definitive guide, API contracts align expectations, prevent errors, and cement the reliability of software interactions. This article breaks down the ‘how’ and ‘why’ of API contracts, including creation, benefits, and maintenance strategies for developer and consumer success.

3 Powerful Extensions to Improve Security and Get the Most Out of Kong

OAuth 2.0 is the current gold standard for secure delegated authorization. The reason is simple: OAuth puts control back in the hands of the users. It enables users to securely grant access to their resources without having to share passwords with third-party applications. Hence, it's one of the most widely adopted standards in the industry.

Mastering Access Control Allow Origin: Your Guide to Secure Cross-Domain Requests

Understanding and configuring the Access-Control-Allow-Origin header is critical for developers managing cross-domain requests. In this blog, we will look at setting the right headers to enforce security while allowing data exchange between different domains, including handling cross-domain requests as specified by the CORS specification. Prepare to equip yourself with the tools to implement cross-origin resource sharing effectively.

Deploy a Python FastAPI Application to Render

In the world of Python frameworks, FastAPI is the new kid on the block and a great choice for building APIs. Equally, Render is a good option for developers who want to quickly test their applications in a production environment for free. In this post, we'll run through how to deploy a FastAPI app to Render. First, though, let's explore why FastAPI and Render are often chosen by developers.