Systems | Development | Analytics | API | Testing

%term

Transforming Telco with Trusted AI Everywhere

The AI technologies of today—including not just large language models (LLMs) but also deep learning, reinforcement learning, and natural-language processing (NLP) tools—will equip telcos with powerful new automation and analytics capabilities. AI-powered automation is already driving significant margin growth by reducing costs.

Getting Started with Generative AI

It's not hard, it's just new. How can you, your business unit, and your enterprise utilize the exciting and emerging field of Generative AI to develop brand-new functionality? And once you’ve figured out your use cases, how do you successfully build in Generative AI? How do you scale it to production grade?

How To Use Zig for Elixir NIFs

Elixir excels at building scalable and maintainable applications. However, sometimes Elixir is not the best language to tackle specific tasks, and it can fall short in some areas, like direct system interaction. Fortunately, Elixir offers NIFs (Native Implemented Functions): a path for integrating with other languages to improve these gaps.

Call a PostgreSQL Stored Procedure from an API

The ability to call a PostgreSQL stored procedure from an API allows for rapid development in a secure way. Rather than writing database queries to interact with your data you can utilize an API that can be rapidly developed and reused many times. The reusability of APIs and using stored procedures means if you are scaling from a single backend application to hundreds your APIs will not change. Table of Contents.

API Security Fundamentals: Everything You Need to Know

You’ve probably heard of the Internet of Things (IoT); all those everyday objects that incorporate computing functions. For example, the IoT allows you to connect your phone to your refrigerator. This way, you can know exactly what to buy at the supermarket for that impromptu dinner that night. Perhaps you’re part of a DevOps team, using microservices and containers to build and deploy legacy and cloud-native applications quickly and iteratively.

Docs as Code: Screenshot Automation at Kong

Imagine this: You're documenting an unreleased feature, and your documentation requires screenshots. However, you're working in an internal environment that includes features you don't want to reveal to the public. What do you do? We faced this exact situation during the API Summit release when we needed to capture screenshots of the new Kong Konnect Plus dashboard while our internal environment also showcased Mesh Manager features.

Tech in Business: Benefits of Outsourcing Cybersecurity Solutions to MSPs

In today's fast-paced digital landscape, technology has become an integral part of daily business operations. From managing internal processes to customer interactions, technology plays a critical role in ensuring a company's success. However, as technology evolves, so do the threats that businesses face.