[Videos](/resources/videos)Videos[Engineering](/resources/videos/engineering)Engineering [__Running Secure IoT Services at the Edge__](/resources/videos/running-secure-iot-services-at-the-edge)__Running Secure IoT Services at the Edge__[](/resources/videos/running-secure-iot-services-at-the-edge)
[Videos](/resources/videos)Videos[Enterprise](/resources/videos/enterprise)Enterprise [__Keeping You Up (to Speed) With Insomnia__](/resources/videos/keeping-you-up-to-speed-with-insomnia)__Keeping You Up (to Speed) With Insomnia__[](/resources/videos/keeping-you-up-to-speed-with-insomnia)
[Videos](/resources/videos)Videos[Engineering](/resources/videos/engineering)Engineering [__The Importance of API Management Governance__](/resources/videos/the-importance-of-api-management-governance)__The Importance of API Management Governance__[](/resources/videos/the-importance-of-api-management-governance)
[Videos](/resources/videos)Videos[Engineering](/resources/videos/engineering)Engineering [__Top New CNCF Projects to Look Out For__](/resources/videos/top-new-cncf-projects-to-look-out-for)__Top New CNCF Projects to Look Out For__[](/resources/videos/top-new-cncf-projects-to-look-out-for)
[Videos](/resources/videos)Videos[Engineering](/resources/videos/engineering)Engineering [__Turning Infrastructure Into Software Through Cloud Engineering__](/resources/videos/turning-infrastructure-into-software-through-cloud-engineering)__Turning Infrastructure Into Software Through Cloud Engineering__[](/resources/videos/turning-infrastructure-into-software-through-cloud-engineering)
[Videos](/resources/videos)Videos [__Customizing Kong Developer Portal__](/resources/videos/customizing-kong-developer-portal)__Customizing Kong Developer Portal__[](/resources/videos/customizing-kong-developer-portal)
[Videos](/resources/videos)Videos[Enterprise](/resources/videos/enterprise)Enterprise [__Fireside Chat: Implementing Authorization for Cloud Native Applications__](/resources/videos/fireside-chat-implementing-authorization-for-cloud-native-applications)__Fireside Chat: Implementing Authorization for Cloud Native Applications__[](/resources/videos/fireside-chat-implementing-authorization-for-cloud-native-applications)
[Videos](/resources/videos)Videos[Enterprise](/resources/videos/enterprise)Enterprise [__Digital Acceleration in Global Pharma__](/resources/videos/digital-acceleration-in-global-pharma)__Digital Acceleration in Global Pharma__[](/resources/videos/digital-acceleration-in-global-pharma)
[Videos](/resources/videos)Videos[Enterprise](/resources/videos/enterprise)Enterprise [__Automated APIs for Scaling Enterprises: How to Set Standards and Create Smooth API Implementations__](/resources/videos/automated-apis-for-scaling-enterprises)__Automated APIs for Scaling Enterprises: How to Set Standards and Create Smooth API Implementations__[](/resources/videos/automated-apis-for-scaling-enterprises)
[Videos](/resources/videos)Videos[Engineering](/resources/videos/engineering)Engineering [__Work Smarter, Not Harder: Using ML to Observe Your Kuma API Metrics__](/resources/videos/work-smarter-not-harder)__Work Smarter, Not Harder: Using ML to Observe Your Kuma API Metrics__[](/resources/videos/work-smarter-not-harder)
[Videos](/resources/videos)Videos[Engineering](/resources/videos/engineering)Engineering [__Styra DAS & Kong Mesh: Policy-as-Code to Control Microservice-Based Communication at Scale__](/resources/videos/styra-das-and-kong-mesh)__Styra DAS & Kong Mesh: Policy-as-Code to Control Microservice-Based Communication at Scale__[](/resources/videos/styra-das-and-kong-mesh)
[Videos](/resources/videos)Videos[Engineering](/resources/videos/engineering)Engineering [__Kong Builders – November 10 – Kong Ingress Controller & Knative__](/resources/videos/kong-builders-november-10-kong-ingress-controller-knative)__Kong Builders – November 10 – Kong Ingress Controller & Knative__[](/resources/videos/kong-builders-november-10-kong-ingress-controller-knative)