This article originally appeared on Gigaom.
Enterprises are building an API First strategy to keep up with their customer
needs, and provide resources and services that go beyond the confines of
enterprise. With this shift to using APIs as an extension of their enterprise
IT, the key challenge still remains choosing the right deployment model.
Even with bullet-proof technology from a leading provider, your results could
be disastrous if you start off with a wrong deployment model. Consider
developer scale, innovation, incurring costs, complexity of API platform
management, etc. On the other hand, forcing internal developers to hop out to
the cloud to get API metadata when your internal API program is just starting
is an exercise leading to inefficiency and inconsistencies.
Components of APIs
But before we get to deployment models, you need to understand the components ... (more)
As with most modernized economies, the United States economy utilizes
capitalist principles. It is only fitting that we invented a technological
solution that will help companies engage in c-api-talism using APIs in a more
If we look back into the history of mankind, we progressed towards more
civilized, mature, monetary-based economies on a steady basis. The
progression from the Stone Age, to the Bronze Age, to the Iron Age, to the
Industrial Age and to the current Digital Age all made strides towards the
current digital economy.
The Stone Age was about using... (more)
Kin Lane recently wrote a couple of blogs about why copyrighting an API is
not common. I couldn’t agree more that copyrighting APIs is uncommon. First
of all, the API definition is just an interface (It is the implementation
detail that is important, and needs to be guarded), so it doesn’t make any
sense to copyright an interface. (It is almost like copyrighting a pretty
face ). Secondly, the whole idea of exposing an API is you are looking for
others to finish the work you started by just providing the plumbing work.
Why would anyone want to get involved with a copyrighted API a... (more)
[by Andy Thurai] "Application-Aware Firewalls."You may have heard this term
recently and wondered what it meant. When it comes to security, everyone
thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email
security and even Web security, but most people don’t think in terms of
application level security unless either you are the developer, admin, or
user of those specific services or perhaps a hacker. Especially when your
traditional network boundaries disappear you can’t carry all of those
devices with you. When you move out of your traditional boundaries, towards ... (more)
Andy Thurai, Chief Architect & CTO, Intel App security & Big Data
(@AndyThurai) | David Houlding, Privacy Strategist, Intel (@DavidHoulding)
Original version of this article appeared on VentureBeat.
Concern over big government surveillance and security vulnerabilities has
reached global proportions. Big data/analytics, government surveillance,
online tracking, behavior profiling for advertising and other major tracking
activity trends have elevated privacy risks and identity based attacks. This
has prompted review and discussion of revoking or revising data protection
laws govern... (more)