Systems | Development | Analytics | API | Testing

%term

Kong and Istio: Setting up Service Mesh on Kubernetes with Kiali for Observability

Service mesh is redefining the way we think about security, reliability, and observability when it comes to service-to-service communication. In a previous blog post about service mesh, we took a deep dive into our definition of this new pattern for inter-service communication. Today, we’re going to take you through how to use Istio, an open source cloud native service mesh for connecting and securing east-west traffic.

People Don't Want Software Products Anymore - They Want Software Ecosystems

Recently, I read an article called “For IoT, think about creating a minimum viable ecosystem” on Stacey on IoT blog, which got me thinking about what we ourselves have been observing in the SaaS sector. In particular, the article says: “With the internet of things, companies are no longer trying to create a product to offer value, but rather establish relationships between companies and individuals to create value.

5 best practices to deliver trust in your data project: Tip #3 Take ownership around a single source of trusted data

Would you imagine e-commerce without an electronic catalog or the web without search engines? Digital transformation requires single points of access to enable a wider range of people to access a wider range of information.

How Worldline puts APIs at the heart of payments services

Editor’s note: Today we hear from Worldline, a financial services organization that creates and operates digital platforms handling billions of critical transactions between companies, partners, and customers every year. In this post, Wordline head of alliances and partnerships Michaël Petiot and head of API platform support Tanja Foing explain how APIs and API management enable this €2.3 billion enterprise to offer its services to partners in a wide variety of industries.

Data Privacy through shuffling and masking - Part 2

In the first part of this blog two-part series, we took a deep dive on Data Shuffling techniques aiming to mix up data and allowing to optionally retain logical relationships between columns. In this second part, we will now focus on Data Masking techniques as one of the main approach to guarantee Data Privacy.