Systems | Development | Analytics | API | Testing

API

Minimizing Security Risks in APIs and Microservices

Application Programming Interfaces (APIs) and microservices are the foundational pillars of digital transformation initiatives. They simplify the development process for our technology teams, enabling them to innovate faster, increase customer engagement and boost business agility. However, while this transformation of business digitally opens doors to limitless opportunities, it also opens doors to many challenges – with one of the most significant challenges being security.

5 Reasons You Should Be Using Microservice-Based Architecture

‘Microservices’ and ‘Microservice-based architecture’ are concepts that are experiencing a rapid increase in popularity throughout the developer community and it’s ability to deliver simplicity in an increasingly complex web of applications, systems and databases is evident. But despite the popularity of microservice-based architecture, you may wonder what makes it so special. What are microservices and why should you join the trend?

API Strategy Fundamentals: Obtaining Executive Sponsorship

The term “digital strategy” has become something of a buzzword, but when it comes to defining your company’s approach to APIs and its digital economy, it’s paramount that you create a truly strategic plan that has the support of your organization’s executive. Without a validated, well-articulated, and executive-backed plan, your organization will find it almost impossible to consistently and successfully hit its targets.

Understanding the Basics of Envoy Configuration

Envoy is a key part of a number of service meshes currently on the market, including Istio and the Kuma CNCF Sandbox project. As such, it is often helpful to better understand how Envoy is configured to operate as a data plane in a service mesh. In this session, you’ll learn about the basics of Envoy configuration, like listeners, filters, clusters, and endpoints.

Kubernetes Ingress gRPC Example With a Dune Quote Service

APIs come in all different shapes and forms. In this tutorial, I’ll show you a Kubernetes Ingress gRPC example. I’ll explain how to deploy a gRPC service to Kubernetes and provide external access to the service using Kong’s Kubernetes Ingress Controller. And to hype you up a little bit about the upcoming live-action movie, Dune, based on Frank Herbert’s book, I created a Kubernetes service that delivers Dune quotes.

Back by Popular Demand: Why Dell ISG's DevOps Embraces Collaborator

Dell’s ISG division consists of storage, servers and networking, cloud solutions, data protection, and converged/hyper converged infrastructure. With over 50 product groups and over 10k employees, standardization was a barrier to achieving true workforce collaboration and mobility. In order to reduce duplication of effort and increase alignment and collaboration, Dell-ISG created a centralized DevOps group and chose Collaborator as their single code and peer review tool.