Recent Posts

Secure your API with these 16 Practices with Apache APISIX – part 2

We’ve listed 16 practices to help secure one’s APIs and described how to implement them with Apache APISIX. Authentication – Verifies the identity of users accessing APIs. Authorization – Determines permissions of authenticated users. Data Redaction – Obscures sensitive data for protection. Encryption – Encodes data so only authorized parties can decode it. Error Handling – Manages responses when things go …

Read More »

Secure your API with these 16 Practices with Apache APISIX – part 1

A couple of months ago, I stumbled upon this list 16 practices to secure your API: Authentication – Verifies the identity of users accessing APIs. Authorization – Determines permissions of authenticated users. Data Redaction – Obscures sensitive data for protection. Encryption – Encodes data so only authorized parties can decode it. Error Handling – Manages responses when things go wrong, …

Read More »

companies plan to increase their investment in developers and development tools this year.

According to the 2024 Java Developer Productivity Report published by Perforce Software, companies plan to increase their investment in developers and development tools this year. Perforce analyzed responses from 440 developers, of which 42% were Java developers or architects. 60% of respondents plan to recruit more Java developers in the upcoming year, while 27% were unsure, and 13% did not …

Read More »