Systems | Development | Analytics | API | Testing

Latest Blogs

What is a Reusable API?

You don’t always need to generate a new API when you want to connect applications and other digital assets to your network. Instead, reusable APIs let you connect multiple applications and systems. As a result, you save time, improve functionality, and make information easier to track. During your application development process, you might think that you need to add innumerable APIs so your assets can communicate with each other.

Qlik Launches Order-to-Cash Solution Accelerators for SAP: Modern Real-time Analytics to Optimize Your Working Capital

Today, more than ever, line-of-business users responsible for managing working capital need actionable insights in real-time. At the same time, IT/data teams want to accelerate projects, as well as modernize and integrate their data architectures and analytics, while managing risks and costs.

Authorizing Microservice APIs With OPA and Kuma

Many companies are leveraging DevOps, microservices, automation, self-service, cloud and CI/CD pipelines. These megatrends are changing how companies are building and running software. One thing that often slips through the cracks is security. With microservices, there’s an increase in the number of APIs companies have to protect. YouTube An error occurred. Try watching this video on www.youtube.com, or enable JavaScript if it is disabled in your browser.

Tutorial to Set Up Usage-Based API Billing with Moesif and Chargebee

Modern API businesses are migrating towards usage-based billing models which enables automatic expansion revenue while removing barriers to adopting a new API. With Moesif you can integrate with subscription management solutions like Recurly and Chargebee to quickly add advanced usage-based billing in a few minutes. In this guide, we’ll walk through integrating Moesif with Chargbee and some recommendations for usage-based billing.

What is a Docker Container?

The rapid pace of updates and upgrades to operating systems, software frameworks, libraries, programming language versions – a boon to the future of fast-paced software development, has also come to slightly bite us in the back because of having to manage these very many dependencies with their different versions across different environments.

Infographic: The State of Software Code

We surveyed nearly 1,000 developers across the U.S. to uncover key development trends and insights. Today’s businesses are software businesses. If there was any positive in 2020, it’s the power software has to allow us to continue in some “normal” sense. Learn how this survey uncovers how too many companies and their development teams still have a major blind spot when it comes to errors in their code.

Creating your managed Kafka shortlist

You’ve been handed the not-so-easy task of scoping a managed Kafka for your team. How do you start the shortlist? Post something on Reddit? Skim read a gazillion review blogs? Crash Google Chrome opening a thousand tabs to compare feature lists? If you’re going to run a Kafka POC with two or three vendors, or you’re trying to find the best Kafka for your business, how can you narrow down your selection? Let’s get to it.

The Easy Ways to Migrate Jira to an on-Prem Solution

By now you've heard that Atlassian is deprecating its server products. For Jira users who cannot or do not want to move to the Cloud, this is troubling news. Data Center is an option, but it's quite an expensive alternative if you do not need its minimum 500 users. Then again, it's quite disruptive to migrate to a new tool, isn't it? No one wants to interrupt their workflow by changing tools — especially one that is so central to daily operations. But it does not have to be so scary.

DevSecOps Checklist for Reliable, Automated Software Security

The purpose of a DevSecOps checklist is not to list every single action and practice you should take to ensure that DevSecOps pipeline is effective. Rather, the purpose is to help you establish the right sort of DevSecOps mindset. DevSecOps is more than a collection of best practices, it’s a shared mindset that security is the responsibility of everyone on your team.