Usually, we’d start a blog post like this one rather light‑heartedly, but the mood of the times is undoubtedly somber, the reasons for that being too numerous to joke about. However, we hope you’re doing well – and again, we have some news to share. For starters, we at the NGINX Unit team believe that the term […]
Studies show that 91% of enterprises are using or have plans to use microservices. The reasons are well documented — monolithic architectures are hard to develop and maintain, while microservices allow for greater agility with smaller, targeted services. However, microservices can’t function alone — they often work together to compose larger applications. As organizations build out more microservices, often […]
There has never been a better time for businesses to outsource software development to an expert third party rather than maintaining in-house provision. Gone are the days when outsourcing was associated solely with cost efficiency and cheap labor. Today it is about partnering to achieve a step change in performance and deliver a better quality […]
When designing systems that enable secure authentication and authorization for API access, you must consider how your applications and users should authenticate themselves. In this article, we’ll compare three different ways to achieve this: API Keys, HTTP Basic Authentication, and OAuth. We’ll also highlight what the benefits and drawbacks are for each method. API Keys Using API keys […]
Authorization and authentication are often considered interchangeable. However, these systems do doing vastly different things. Understanding the differences between them is incredibly crucial for adequate security implementation. Authentication = Who are you? Authentication is essentially the practice of proving that you are who you say you are. Trust is hard to come by in any system. […]
With the advent of microservices, the functionalities that used to be bundled together in a single web/mule application are now running on different containers across VMs and at times across datacenters. This presents a huge challenge to trace transactions as they traverse across the container/VM boundaries. To address this challenge, companies build a custom distributed tracing […]
Long ago, I built a web app for an enterprise (200k+ employees). Feedback on the web app prompted me to do an experiment. What would happen if I were to create a WhatsApp chatbot to solve the specific use case, instead of a web app? Would people like it better? Would it be more useful? But the […]
Business plans are a pivotal part of the strategic financial decision-making process. They help put thoughts down on paper, present market data to back up the rhetoric, and articulate the financial side of an argument. When it comes to business plans, it’s not only about the numbers; the narrative and the assumptions used to drive […]
While 83% of workers say remote work would make them happier with their jobs, not many people anticipated that the shift would happen as suddenly as it did. With companies around the world quickly transitioning their workforce to working from home, some employees will find it a challenge to make the switch. While designers may have dreamed of working in their […]
It is not hard to see that some people are struggling to handle errors, and some are even totally missing it. Handling errors properly means not only reducing the development time by finding bugs and errors easily but also developing a robust codebase for large-scale applications. In particular, Node.js developers sometimes find themselves working with not-so-clean code […]