Systems | Development | Analytics | API | Testing

%term

JWT Authentication: When and How To Use It

JWT stands for JSON Web Token, is a famous technology that comes with its own controversy. Few people find it quite beneficial, while others feel one must never use it. Nonetheless, in this article, we shall discuss the reason behind this controversy, understand JWT in detail, and when and why one must use it. We'll cover the following section in this blog. JWT (JSON Web Token) authentication is a process or method used to verify the owner of JSON data.

BigQuery admin reference guide: Tables & routines

Last week in our BigQuery Reference Guide series, we spoke about the BigQuery resource hierarchy - specifically digging into project and dataset structures. This week, we’re going one level deeper and talking through some of the resources within datasets. In this post, we’ll talk through the different types of tables available inside of BigQuery, and how to leverage routines for data transformation.

Interview With Cybersecurity Expert Tom Kirkham

For our latest expert interview on our blog, we’ve welcomed cybersecurity specialist Tom Kirkham to share his wealth of experience on the topic of cybersecurity. Tom is the founder and CEO of IronTech Security, a managed security service provider (MSSP) that focuses on educating and encouraging law firms, court systems, water utilities, and financial firms to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks.

PII Pseudonymization: Explained in Plain English

Data processors handle an abundance of data — including personal information about individuals. As the collection and use of data become more widespread, governments continue to enact laws that protect personally identifiable information (PII). Failing to comply with such laws means risking serious fines and penalties, and damaging public trust. Masking PII through pseudonymization is one way to protect it.

SmartBear Addresses Rapid Expansion of APAC Business and Channel Partners with New Office in Melbourne, Australia

With more than 50% growth in APAC-based business year over year, SmartBear increases headcount and support for local customers and partners with new, larger office in downtown Melbourne.

MS3 Supports 10K+ Transactions/Second With Kong Gateway and Kuma Service Mesh

MS3 specializes in enterprise integration software, cloud migration strategies and API enablement. I’ve worked at MS3 for about five years. For the last year, I’ve been the principal product manager for Tavros, an enterprise integration platform from MS3. This article will dive into how we’re leveraging Kong Gateway and Kuma service mesh in Tavros.

Application Lifecycle Management: A Comprehensive Guide

Discipline is the key to success for all companies doing well in their field or reaching a trillion-dollar valuation. They manage the software and update it very frequently when it comes to providing services. So how are they able to manage it and keep their software updated every moment? The answer is ALM—Application Lifecycle Management. ALM includes the people, the software, the tools, and the processes included in software development, from planning to deploying it for end customers.