Every day, tens of thousands of API calls result in a virtual hug or kiss sent through Avocado, the multi-platform couples app. For messages and other media, it’s dozens of times more, resulting in millions of calls a day to the Avocado API… and growing. So far: No major service disruptions, no server explosions, and hardly any pulling of hair out from our heads.
At the API Craft un-conference this week in Detroit, some of the best minds in the API business gathered to talk over the problems that plague us most. It was a unique event in that the agenda was set and run by the attendees in true meet-up fashion. Quakers will recognize the format – for the conference kick-off, the group sits in silence until someone is moved to suggest a session. You suggest it, you run it and anyone who attends your session also participates in it. The sessions are true whiteboard brainstorming activities, with the outcomes posted into Github for future reading.
The internet is full of videos that teach how to use complex software, like Photoshop or Final Cut Pro. Why not use the same technique for teaching how to use an API? Younger developers, who grew up in the age of these video tutorials, find this format especially useful. These types of videos do not have to have high production costs – they simply require screen capture and voice-over.
This is an interview with Bob Bickel, co-founder of Redline 13. Bob is a leader in the tech field with experience at Bluestone, HP, JBoss, Hyperic, CloudBees, eXo and RunSignUp. We picked the Redline13 ZipCode API to be the API of the week in July 2013.
Software developers have a lot going for them. They’re highly paid, in demand, and have an unlimited number of projects where they can add value. The one thing they DON’T have in abundance is time, and they HATE wasting it. It’s wise to keep this in mind when setting up your API program.
Simple Object Access Protocol (SOAP) and Representational State Transfer (REST) are relatively new technologies that are increasingly showing up in modern applications like mobile applications and web services. Unfortunately, their rapid rise in popularity also brings significant and damaging security vulnerabilities. Understanding how to provide web and mobile application security against these vulnerabilities is only one small step in the right direction. Developers face a number of challenges when it comes to building secure code.
The UK’s Open Data Institute is encouraging all API developers to include a machine-readable metadata description whenever publishing an API that enables access to a dataset. The proposed publisher guide defines best practice in how to include a machine readable rights statement in API documentation, and follows recent international efforts to define API standards and best practices.
Here is an interview with Brandon Wirtz, CTO of the very exciting text mining API startup Stremor.com. We have covered Stremor here before. Liquid Helium API is the core of all Stremor’s products and it extracts information about sentence and paragraph structure, word usage, parts of speech, grammar, writing style, punctuation, and author bias. Stremor also has a new kind of search engine called Samuru based on it’s language APIs.
The popularity of hackathons shows no sign of slowing. As software makers increasingly seek opportunities for camaraderie and creative expression, all types of organizations are planning to host events that keep their cause or product at the forefront of innovation. We estimate that there were around 350 hackathons in the U.S. in 2012, and that there will be roughly twice as many in 2013. Given this proliferation, hackathon organizers are wise to understand that their event is likely competing for the attention of local software developers.
As promised in my last blog “Big Data, API, and IoT …..Newer technologies protected by older security” here is a deep dive on Big Data security and how to effortlessly secure Big Data effectively. Like many other open source models, Hadoop has followed a path that hasn’t focused much on security. In order to effectively use Big Data, it needs to be secured properly.