Systems | Development | Analytics | API | Testing

Building an AngularJS application using the DreamFactory REST API backend

If you’re building an AngularJS application, you’ve landed on the right page. Now that DreamFactory 2.0 is live on Bitnami, our team has been busy building example apps to show how easy it is to use DreamFactory as your REST API backend. I’ve been working on DreamFactory’s AngularJS sample address book app and tutorial. This blog summarizes a few important things to know about getting started with the DreamFactory Angular sample app.

Kuma 0.5 Released With Advanced TLS, Fault Injection, New GUI and More

We are happy to announce the release of Kuma 0.5! We are particularly proud for this release since it introduces about 30 new features and many improvements and – as usual – every Kuma improvement is always available on both Kubernetes and Universal (VMs) modes. This version of Kuma also ships with a new logo for the project! The new logo for Kuma signifies a new era for the project, driven by more feature maturity as well as more adoption within the community.

Instantly Create A Salesforce REST API

The Salesforce CRM is crucial to business operations for millions of organizations. Data often needs to be moved between Salesforce and other technologies such as SQL or NoSQL databases. Using DreamFactory's powerful integration platform you can easily create sophisticated workflows for moving data between Salesforce and any number of destinations.

6 Reasons to Use API Management in the Age of Loosely-Coupled App Design

APIs (Application Performance Interfaces) have changed the way we build applications, and they’ve changed how applications communicate with each other. Essentially, APIs give enterprises the agility to rapidly and cost-effectively incorporate new services and updates into their applications and IT infrastructures.

7 API Design Trends

The application program interface (API) of a platform is its toolkit for building software apps; We’re taking a closer look at Seven API design trends. It’s the sandbox that defines the rules for how components will interact with each other. Our own interactions are changing in the 2020s, especially in the post-coronavirus era. APIs for operating system (OS)- or web-based platforms and graphical user interfaces (GUI) are all changing along with us.

Instantly Create A Salesforce REST API

The Salesforce CRM is crucial to business operations for millions of organizations. Data often needs to be moved between Salesforce and other technologies such as SQL or NoSQL databases. Using DreamFactory’s powerful scripting engine you can easily create sophisticated workflows for moving data between Salesforce and any number of destinations.

Customer Health Metrics Help CSM Teams Reduce Churn and Accelerate Upsell in API Platform Companies

One of our API-first brethren in San Francisco recently shared with us how they built their synthetic testing system to monitor uptime and latency. It was a large undertaking involving a huge Redshift warehouse, Datadog and many man months of engineering effort. At the end of it, they could measure latency’s completeness, whether it was functionally correct and, when it moved out of bounds, alert CSM/engineering teams.

Dell Boomi: Reviews, Pricing, and Comparison

Is Dell Boomi the best API management tool? Discover Boomi reviews, pricing, and some alternatives to Dell Boomi. In less than a decade, cloud computing has gone from being a tech industry buzzword to a well-established best practice. The cloud is so popular that the vast majority of businesses are now using a “multi-cloud” strategy with two or more cloud providers—94 percent of enterprises, according to a study from McKinsey & Company.

API Proxy vs API Gateway

Although Application Programming Interface (API) proxies and API gateways have somewhat similar high-level goals, the two are significantly different in both functionality and capabilities. APIs and microservices transformed the way businesses built their applications and interact with consumers. However, a setup which exposes multiple IP addresses has inherent weaknesses as this presents multiple targets for bad actors.