Systems | Development | Analytics | API | Testing

Latest Blogs

Cloud Testing: How to overcome the challenges of testing on-premise?

If you’ve been performing on-premise testing in your organization, you know the rules already. But for the uninitiated, on-premise testing is a form of testing where testers perform tests on local machines, systems, or devices set up at an office. As the name suggests, it happens on-premise. On-premise testing comes with a lot of responsibility. From the maintenance and monitoring of the machines and software to upgrading and installations — you’ll need all hands on deck.

Configuring a Kubernetes Application on Kong Konnect

Hello, everyone! Viktor Gamov, a developer advocate with Kong here. In this article, I would like to show you how to set up service connectivity using Kong Konnect and Kubernetes. I will deploy an application in Kubernetes, configure a runtime through Konnect and demonstrate some management capabilities like enabling plugins. Let’s dive right in!

JWT Authentication: When and How To Use It

JWT stands for JSON Web Token, is a famous technology that comes with its own controversy. Few people find it quite beneficial, while others feel one must never use it. Nonetheless, in this article, we shall discuss the reason behind this controversy, understand JWT in detail, and when and why one must use it. We'll cover the following section in this blog. JWT (JSON Web Token) authentication is a process or method used to verify the owner of JSON data.

BigQuery admin reference guide: Tables & routines

Last week in our BigQuery Reference Guide series, we spoke about the BigQuery resource hierarchy - specifically digging into project and dataset structures. This week, we’re going one level deeper and talking through some of the resources within datasets. In this post, we’ll talk through the different types of tables available inside of BigQuery, and how to leverage routines for data transformation.

Interview With Cybersecurity Expert Tom Kirkham

For our latest expert interview on our blog, we’ve welcomed cybersecurity specialist Tom Kirkham to share his wealth of experience on the topic of cybersecurity. Tom is the founder and CEO of IronTech Security, a managed security service provider (MSSP) that focuses on educating and encouraging law firms, court systems, water utilities, and financial firms to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks.

PII Pseudonymization: Explained in Plain English

Data processors handle an abundance of data — including personal information about individuals. As the collection and use of data become more widespread, governments continue to enact laws that protect personally identifiable information (PII). Failing to comply with such laws means risking serious fines and penalties, and damaging public trust. Masking PII through pseudonymization is one way to protect it.