Almost Finished

We just need to confirm your email address. To complete the subscription process, please click on the link in the email we just sent you.

Latest Blog Entries

Why OAuth 2.0 Is Vital to IoT Security

The internet is fundamentally an unsafe place. For every service, every API, there are users who would love nothing more than to break through the various layers of security you’ve erected. This is no small concern, either — in the US alone, security breaches cost companies in excess of $445 Billion USD annually. As the…

Read More

by

4 Design Tweaks to Improve API Operations

We’ve previously discussed best practices when it comes to designing an API with quality developer experience. But what will the long term operational repercussions be for the design moves we make now? For example, if URLs are designed without metadata to describe actions, later on, product owners will have a difficult time staring at unintelligible…

Read More

by

Stop Polling and Consider Using REST Hooks

Web APIs have been around for a long time now. While that means there’s a lot of great tools from a lot of amazing developers, it also means that, as a community, the API space has held on to some practices for a long time — some would argue too long in many cases. One…

Read More

by

4 Important Takeaways from the Changing API Ecosystem

If you’ve been paying attention to the API space over the last year, you won’t be surprised to hear that there has been a lot of movement amongst companies that provide API-related solutions. The most noteworthy example is Google’s $625 million acquisition of API platform provider, Apigee, in the fall of 2016. But other examples…

Read More

by