We take another, more critical look at Go, and identify some use cases when Go may not be the best language choice for aspiring microservices developers.| Nordic APIs
Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS) all utilize APIs in the cloud computing stack. We’ll discuss the three layers of the cloud computing space, and view some cloud-based APIs, highlighting the strengths and weaknesses of each particular architecture choice.| Nordic APIs
We compare 3 ways to develop microservices: Lean Strategy, Verbose Development, and Two-Speed IT, discovering that how you build is just as important as what you build.| Nordic APIs
This article looks at 3 different architectures to see how improved token design can boost performance and limit database lookups. Tokens can help structure complex API architectures.| Nordic APIs
Explore the shift from proprietary systems to open standards in the world wide web. Understand the importance of open standards in fostering innovation and collaboration.| Nordic APIs
Our physical and digital worlds are colliding. A new web epoch approaches — an era called the Internet of Things (IoT). In this realm, home devices, city sensors, smart cars, wearables, and every other device we use is connected to the Internet.| Nordic APIs
The API Security Maturity Model is a new model to gauge how mature your API security system is. Spoiler alert: if you're not using Claims, you might not make it to the top.| Nordic APIs
Taking lessons from the recent Flash Zero Day exploits, we reiterate that an API developer should review each and every piece of code before implementing dependencies.| Nordic APIs
OAuth can be paired with OpenID Connect to perform delegation of user identity across microservices for secure and replicable control of access management.| Nordic APIs
API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain keys can be decompiled to extract keys, or deobfuscated from on-device storage, plaintext files can be stolen for unapproved use, and password managers are susceptible to security risks as with any application. In this piece we outline the disadvantages of solely relying on API keys to secure the proper access to your data.| Nordic APIs