Hidden treasure holds a deep fascination and the promise of great wealth. Did you know that there are still dozens of significant treasure hauls still waiting to be found across the globe? Gold bars and coins, pearls, jewels, and precious artifacts. Then there’s Forrest Fenn’s treasure (he’s still alive today). Fenn has buried his Pompeiian artifacts and other treasures worth approximately $2 million in the mountains north of Santa Fe, New Mexico.
With the 1.3 release, Kong is now able to natively manage and proxy gRPC services. In this blog post, we’ll explain what gRPC is and how to manage your gRPC services with Kong.
To gain full potential of the software development workflow, developers today must familiarize themselves with the best workflows, practices, and tools. Fast software production is no longer enough to win today’s technology marketplace. Deployments have to be faster, more reliable, and more accurate than the competitors. A sturdy CI/CD pipeline is the solution to this challenge.
Service mesh is redefining the way we think about security, reliability, and observability when it comes to service-to-service communication. In a previous blog post about service mesh, we took a deep dive into our definition of this new pattern for inter-service communication. Today, we’re going to take you through how to use Istio, an open source cloud native service mesh for connecting and securing east-west traffic.
Recently, I read an article called “For IoT, think about creating a minimum viable ecosystem” on Stacey on IoT blog, which got me thinking about what we ourselves have been observing in the SaaS sector. In particular, the article says: “With the internet of things, companies are no longer trying to create a product to offer value, but rather establish relationships between companies and individuals to create value.