26341 APIs Aren't Enough
25386 Thank you . . .
20216 Monopoly Goes Cashless
19796 Nissan Leaf's Naked APIs
18971 Yes, APIs Are That Big
18376 Modernize SOA with APIs
18321 Go Small or Go Home
17001 Apigee Edge Microgateway
15766 Microservices at Amazon
14936 API Management isn't SOA
14801 Why Telstra Loves APIs
14786 Why Web APIs Won
13721 Swagger's Future
13576 Demo: Apigee Edge
12506 API Mistakes to Avoid
12426 In Search of CDOs
11956 store locator webcast
12196 The API Facade: Overview
11681 Managing Big Data
12026 Data Analytics & APIs
12206 The Anatomy of Apps
by Subra Kumaraswamy Jun 05, 2015
The recent Internal Revenue Service data breach, which used the “Get Transcript” API to access the agency’s data, highlights the increased sophistication of cyber attacks that aim to profit from taxpayers’ personal... Read more
The recent Internal Revenue Service data breach highlights the increased sophistication of cyber attacks that aim to profit from taxpayers’ personal information, and the importance of adaptive API security.... Read more...
by Olaf Domis May 13, 2015
Black Friday, Christmas, peak travel season—no matter what the event, there will come a time when your API infrastructure needs to meet increased business demand quickly. Without the proper, load-tested... Read more
To help you prepare for high-traffic events, this webcast offers a preparedness checklist and includes best practices to help you begin the planning and testing process.... Read more...
by Greg Brail May 12, 2015
In the last decade, the “API” pattern has grown to dominate interactions between clients and servers on the Internet. Many of the largest and most-used apps on the internet today are built atop APIs. APIs have even... Read more
The simplicity of APIs is often underappreciated. As new platforms, languages, and frameworks are developed, a good API remains useful and usable. It's the key to their success.... Read more...
by Shankar Ramaswamy and Marc Schreuder May 01, 2015
Writing software with the right balance of responsiveness, predictability, and reliability is a constant challenge. Overlay the environment of regular technology revolutions that disrupt the status quo, and you have a... Read more
Writing software in a constantly changing technology environment amounts to changing your rocket's engines and guidance systems in flight. Here are some tips on how to stay on the right trajectory—and get stuff done. ... Read more...
by Olaf Domis Apr 30, 2015
Threat protection and application access controls are key security mechanisms that protect APIs when exposed to internal or external users and developers. In this technical deep-dive webcast, Apigee's Subra... Read more
In this technical deep-dive webcast, we discuss API threats and the protection mechanisms that every API and app developer must implement for safe and secure API management. ... Read more...
by Alan Ho Apr 29, 2015
Bolt-on analytics are products that only solve one particular use case, and only pay lip service to integration with other enterprise analytical systems. As an analytics product builder, I cringe whenever an enterprise... Read more
Bolt-on analytics are products that only solve one particular use case, and only pay lip service to integration with other enterprise analytical systems. Here are five reasons why bolt-on analytics cause more headaches than they're worth.... Read more...
by Subra Kumaraswamy Apr 09, 2015
The Maginot Line is remembered as one of history’s most costly strategic blunders. France’s massively complex, heavily fortified, and expensive 940-mile line was built before WWII to keep Germany at bay. But France’s... Read more
Digital security strategies can exhibit a weakness similar to the infamous Maginot Line, as they’re often not designed to quickly adapt to new and unexpected threats.... Read more...