Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS) all utilize APIs in the cloud computing stack. We’ll discuss the three layers of the cloud computing space, and view some cloud-based APIs, highlighting the strengths and weaknesses of each particular architecture choice.| Nordic APIs
We put simplicity and complexity in the ring, applying philosophies from system design theorists to the realm of APIs. Embrace complexity, but reroute confusion to the provider side. We attack many sides of API complexity from microservices, OAuth, to UX to find the perfect balance.| Nordic APIs
The freemium model is common for SaaS & APIs, but how to implement it correctly? See the benchmarks as we compare Freemium API monetization methods across the API space.| Nordic APIs
API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain keys can be decompiled to extract keys, or deobfuscated from on-device storage, plaintext files can be stolen for unapproved use, and password managers are susceptible to security risks as with any application. In this piece we outline the disadvantages of solely relying on API keys to secure the proper access to your data.| Nordic APIs