Systems | Development | Analytics | API | Testing

%term

Access Control Lists with Kong

Access control is an important function in our daily lives. Access control is provided in many different realms. For example, a physical door, a software program, or an API. Access control simply means that you are controlling who/what can access something. We’re going to focus this discussion around access control for an API. Businesses benefit from providing APIs to their internal (and external) developers.

PHP Memory Leaks, How to Find and Fix Them

Memory leaks can happen in any language, including PHP. These memory leaks may happen in small increments that take time to accumulate, or in larger jumps that manifest quickly. Either way, if your app has a memory leak, sooner or later it will cause problems. The source of and solution to PHP memory leaks aren’t always obvious, so you may need to try a few strategies before you eliminate the problem.

How To Create An SFTP REST API

SFTP, or Secure File Transfer Protocol, is a popular solution for transferring files from one device to another. Its simplicity belies its popularity, with the vast majority of actions involving either sending (uploading) or receiving (downloading) files. Files are typically transferred between a FTP client such as FileZilla and an FTP server, although in many cases programmatic solutions involve transferring files from one server to another.

A guide to the Enterprise Data Warehouse (EDW)

Companies use predictive and business analytics to gain an advantage over their competitors and claim a bigger share of the market. But with the accelerated proliferation of data volume, speed and variety, establishing a system to make sense of this data is posing ever-increasing challenges. Several data solutions - from databases to data lakes - have emerged to empower companies of all sizes to take over their data and use it to accelerate growth.

Don't trust Kafka Connect with your secrets

Open source is great but sometimes it misses the mark for security at enterprise levels. Take Kafka Connect, I’ve built a few connectors in my time and prior to its introduction to Apache Kafka back in 2017 I used other hand cranked pieces of software and security was always a primary concern. One feature that will quickly put a blocker on your project being successful is not reaching production. There’s a number of reasons for this but high up, usually top, is security.

Need to Node - Volume 67

In this volume of Need to Node, you can find the latest news on Deno, a recording of our webinar ‘New and Exciting Features to Land in Node.js version 14’ and ‘JavaScript features to forget’. Need to Node is a weekly bulletin designed to keep you up-to-date with the latest news on the Node.js project, events and articles. You are always welcome to collaborate and participate. Please let us know if we missed a piece of content you think should be included!

Good Catch: Monitoring Revenue When it Matters Most

Revenue monitoring not only involves monitoring huge amounts of data in real-time but also finding correlations between thousands, if not millions, of customer experience and other metrics. Are traditional monitoring methods capable of detecting a correlation between a drop in user log-ins and a drop in revenue as it’s happening? For many reasons, the answer is no.