How to Handle Batch Processing with OAuth 2.0

Recently on the Nordic APIs channel we’ve had a few people ask — how do you handle batch processes that are secured with OAuth 2.0? Batch requests are ones executed automatically or programmed to repeat recurringly.

Usually we use OAuth to confirm user identity for API calls, but the problem is that OAuth 2.0 isn’t really designed for batch processing. Read more

Share the knowledge

10 GraphQL Consoles in Action

Most web API providers probably already know about GraphQL by now. It’s the API query modeling language making waves throughout the API industry, allowing developer users to interact with a web API in an arguably cleaner method. The industry is still divided, though. Read more

Share the knowledge

6 Steps To Evolve an API into a Lucrative Platform

There’s a certain breed of developer that has been talking about the benefits APIs can offer for many years now. In fact, if you’re reading this article, it’s likely that you’re one of them!

But it’s only in recent years, in part thanks to the rise of consumer facing services like IFTTT and Zapier, that more and more people have come around to this point of view. Read more

Share the knowledge
Complying with Tough New EU Rules on Data Protection

Complying with Tough New EU Rules on Data Protection

A wide ranging set of rules to protect the data of citizens in member nations of the European Union was adopted in April. Known as the General Data Protection Regulation (GDPR), the measure’s goal is to replace the existing patchwork of national laws with a single modern regulation that reflects the digital age. Read more

Share the knowledge
How Pokemon Go fans hacked 'em all hackers

How Pokémon Go Fans Hacked ‘Em All: And How to Prevent Similar Reverse-Engineering

Every developer hopes for huge user bases populated by large amounts of monthly users. People using an application to its potential in the thousands, if not hundreds of thousands, is a dream come true. Unfortunately for API services, with a greater deal of exposure comes a marked increase in vulnerability. Read more

Share the knowledge