Systems | Development | Analytics | API | Testing

Automating Underwriting Approval Processes With a Human Touch: 4 Things to Know

As technology continues to advance, the insurance industry is seeing a shift toward automated underwriting approval processes. This trend has been gaining momentum over the past few years and is expected to grow as insurers seek to streamline their operations and reduce costs without losing the human touch.

REST API Design: Filtering, Sorting, and Pagination

RESTful APIs have become a cornerstone of modern web development, allowing developers to create powerful, scalable, and efficient web applications. When designing REST APIs, it's essential to consider key features like filtering, sorting, and pagination to ensure optimal user experience and server performance. Filtering allows users to narrow down search results by defining specific criteria, while sorting allows results to be ordered in a particular manner.

ICA Selects WSO2 to Create a Single Platform for API Management

To expand its product offerings and include pharmaceuticals, real estate, and financial services, ICA has acquired several companies. However, in an attempt to establish a consolidated API platform across all of its products, ICA aimed to develop its own API management solution. Yet, like many other companies, ICA faced a common challenge.

Next.js Libraries: The Next Big Thing in 2023

In the world of a diverse group of frameworks, one of the popular frameworks for ‘hitting the ground running’ is Next.js. Did you know that mobile devices account for 2/3 of all web usage? Given this, it is crucial to optimize websites and develop web applications for the best possible mobile experience. Due to this, developing high-performance web applications and lightning-fast static web pages requires robust technology.

Custom Plugin Development with Kong Gateway

Kong plugins are the real muscle behind the Kong ecosystem, giving you the power to implement API gateway policies in a plug and play fashion. In this session, we will deep dive into the Kong plugin architecture, basics around plugin development, testing, and automated delivery. You will have the opportunity to learn about different plugin phases during an API request, unit testing, and installation of a plugin in Kong Gateway.

How to Create a Requirements Traceability Matrix - With Examples

To build the highest quality product, you need to make sure requirements are met, tests are run, and issues are resolved. And this is particularly true if you're in a highly regulated industry. What's the best way to make sure this happens? Creating a requirements traceability matrix. 👀 Read the guide: What is a requirements traceability matrix >> For many organizations, a traceability matrix is first attempted in Microsoft Excel, but there's an easier way.

An Introduction to PHP 8.0's Null Safe Operator

Have you ever come across situations in your code where you had to check for null values before performing operations? Did you find it tedious to keep writing these checks over and over again, leading to code that is hard to read and maintain? Well, what if I told you there is a solution that can simplify your code and reduce the chances of introducing bugs? Introducing the null-safe operator! This operator is a new feature in PHP 8 that provides a concise and convenient way to perform null checks.

What Is Shift-Left Security?

In software development, shift left is a practice that helps developers find vulnerabilities and coding errors earlier in the software development process. Shift-left security is an efficient approach that focuses on security and helps address any security issues in code long before the software is released. Here, we provide an overview of what is shift-left security and offer guidance on how a static analyzer can help you uncover security vulnerabilities early in the SDLC.