Systems | Development | Analytics | API | Testing

Networks

Cigniti

Empowering Transactions Beyond Networks: The Future and Security of Offline Payments in a Digital Era

On many occasions, your mobile phone may be out of network coverage. Or you may be traveling in a remote area without network connectivity. In this digital era, don’t you think you should be given the option to pay digitally in such situations, even when there is a network issue? Being able to pay digitally is far better than the need to carry cash for payments, but that is a separate topic on which we can have a particular blog later.

kong

Zero Trust Network Access (ZTNA) vs VPNs

In today’s modern digital environment, more organizations are relying on remote work than ever before. While this shift has given companies unprecedented flexibility when it comes to deploying their workforce, it has also presented challenges in keeping their devices, operations, and personnel protected, especially in regard to API security. Without proper oversight, attackers can access your organization’s server by exploiting such security vulnerabilities.

Koyeb

Inspect TLS encrypted traffic using mitmproxy and wireshark

I had the chance to finally sit down and find a way to inspect TLS traffic flowing out of an application running on my machine. Although I did not invent anything, I needed to put together a lot of different tricks in order to succeed, and the documentation I could find online regarding this process is scattered, at best. So, here we are with a guide on “how to inspect TLS encrypted traffic without going nuts”. Hope you enjoy!

Testing Kubernetes networking with k6 - Roberto Santalla (k6 Office Hours #91)

How would you go about testing Kubernetes networking? For his initial project with k6, our new Senior Software Engineer, Roberto Santalla, talks to us about how he used k6 to improve end-to-end network throughput and some insights he learned about Kubernetes networking along the way. He is joined by Developer Advocates Nicole van der Hoeven and Leandro Melendez.
perforce

IP Geofencing With Methodics IPLM

IP geofencing should be a central part of your IP strategy. Why? Because your IP portfolio is probably leaking. And IP leakage can cost millions of dollars in lost revenue and market setbacks — not to mention export violation fines. When it comes to IP security, you need a three-pronged approach: This blog will focus on the first pillar listed above: IP geofencing. Talk to a GEOFENCING Expert.

dreamfactory

VPCs: An Introduction to Secure Business Networking

You’ve heard of cloud computing and how businesses use it, but do you know about virtual public clouds? VPCs are designed to give users a private cloud experience on a public cloud. For many, this is the best of both worlds when it comes to cloud storage: you get the benefits of a private cloud with the resources available on the public cloud.

ably

Key choices in AWS network design: VPC peering vs Transit Gateway and beyond

This blog post is the first in what we intend to be a series to detail Ably’s journey in building the next iteration of our global network. It focuses on the design and we will follow up with posts detailing the building, and finally migration from old to new. If you are interested in how you can network AWS accounts together on a global scale then read on! Ably operates a global network spanning 8 AWS regions with hundreds of additional points-of-presences.

apigee

Choosing the right network architecture for your Apigee-fueled APIs

API gateways are a critical component of a modern architecture. Apigee X is Google Cloud's API management platform. It also allows users of the legacy Apigee Edge product to leverage Virtual Private Cloud (VPC) products and features, like Cloud Armor and Load Balancers. With these new security and availability advantages come a new set of challenges. The biggest challenge is accessing API backends in multiple VPCs. This introduces VPC peering transitivity restrictions.

kong

Downstream and Upstream Mutual TLS With an API Gateway

Like many developers and operations professionals, you may have had complicated experiences with security and certificates (encryption of the connection and authentication). Maybe so much so that you try to avoid working on them whenever possible. If you’re looking for a simpler way, Kong may be the answer. As with everything with Kong, the idea is to make things as lightweight as possible, including the complexity of setting up and maintaining certificate-based security.