Systems | Development | Analytics | API | Testing

WSO2

WSO2 API Manager: Leading the Way in API Management and Security

API management and API security are like two sides of a coin, intrinsically part of a greater whole. That is why the recent KuppingerCole report, “Leadership Compass: API Security and Management,” is particularly useful for organizations seeking to develop or update their API strategies. With the report’s comprehensive view of both API management and security, it offers an invaluable resource for understanding their interplay.

WSO2 APK's Distributed Tracing - Mastering API Efficiency

Uncover the power of WSO2 APK's Distributed Tracing capabilities in our latest screencast! Dive into the world of seamless API management with insights from popular tracing systems like Jaeger, Zipkin, Azure Application Insights, and OTLP gRPC. Learn the why and how of configuring distributed tracing in APK, enabling you to diagnose and resolve performance issues, errors, and exceptions efficiently.

Streamlining Cloud Native App Development in Kubernetes with Prioritized API Management

For years, we've witnessed how applications have shifted to the cloud, driven by cost savings, flexibility, on-demand access, scalability, and faster deployment times. During that time, new architectural best practices for building cloud native applications have emerged. (For more insights, refer to this whitepaper.) Yet despite these advances, it remains difficult to build cloud native applications that fully take advantage of Kubernetes, the platform of choice for most cloud deployments.

The API Gateway and the Future of Cloud Native Applications #WordsUnplugged

In this episode of #WordsUnplugged, Chris Davey and Nuwan Dias take a closer look at the Gateway API and its importance in Kubernetes environments. Learn about the challenges of adoption and why education and evangelism are crucial for understanding the flexible and powerful nature of the Gateway API compared to the Ingress specification. Our hosts also touch on how this could impact API Gateway vendors and highlight areas for potential differentiation beyond the standard specification.

EP6: Complexity Uncovered: Navigating Enterprise Software Engineering

In this episode, hosts Sanjiva and Asanka delve into the intricate world of enterprise software engineering, sharing insights gained from their extensive experience working with large enterprises. Join them as they explore the challenges of integrating large systems like CRMs and ERP in digital business transformation, discussing data integration, the impact on organizational culture, and future trends.

The Illusion of Control: Why In-House Platforms Can Undermine Your Business Strategy

In the rapidly evolving tech landscape, the promise of control reigns supreme. And, it’s why founders, CEOs, and technical decision-makers are increasingly drawn to the idea of building in-house platforms. The appeal is understandable: complete sovereignty over every layer of the tech stack, from the user interface down to the most granular data interactions. It's an intoxicating vision that promises a bespoke solution tailored precisely to a company's unique needs.

Pushing the Boundaries of OAuth and OIDC Security - Push Authorization Request (PAR)

In the world of API security, OAuth 2.0 plays a crucial role in authorization. OpenID Connect (OIDC) works seamlessly with OAuth 2.0, providing an identity layer that ensures standardized authentication and user information for applications. Among various grant types, the Authorization Code stands out as a recommended standard. It's known for its advanced security features, support for refresh tokens, reduced exposure of credentials, and adaptability for both server-side and front-end applications.
Featured Post

DBA, The Key to Improving Security and CX Without Compromise

Today's consumers demand Amazon-like digital banking experiences. However, striking the right balance between customer experience and security remains an arduous challenge for banks. A consequence of user-driven authentication mechanisms is that a better customer experience usually comes at the expense of robust security measures. Contributing to the challenge is the fact that the majority of banks today rely on user-driven customer identity and access management (CIAM) systems. This requires customers to provide information each time verification is needed.