Our physical and digital worlds are colliding. A new web epoch approaches — an era called the Internet of Things (IoT). In this realm, home devices, city sensors, smart cars, wearables, and every other device we use is connected to the Internet.| Nordic APIs
API metrics analysis can be used to amplify success within the API space. This piece covers API metrics types, demonstrate applications, and uses two real-life examples of success and failure arising from differing metric analysis methodologies.| Nordic APIs
To kick off a series of blog posts on the API lifecycle, we’ll define what we mean by this term and explore it from a high level. In subsequent posts we’ll dig into the details, so be on the lookout for those!| Nordic APIs
We define the three general approaches to API licensing and availability, comparing Public, Partner, and Private APIs to Leather, Chain, and Plate armor. Expose only what needs to be exposed.| Nordic APIs
API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain keys can be decompiled to extract keys, or deobfuscated from on-device storage, plaintext files can be stolen for unapproved use, and password managers are susceptible to security risks as with any application. In this piece we outline the disadvantages of solely relying on API keys to secure the proper access to your data.| Nordic APIs