Thanks to all who attended the first episode in the Webinar Shorts series on the API Facade pattern. The first episode is an overview of the idea and theory of API facades. Here are the video (20 min.) and slides. Thanks @landlessness.
In the last post after our Webinar Visibility at the Edge - Deep Insights from your API, I talked about what it means to get 360 degrees of visibility from your API. This time, I'll talk about using that 360 view to get deep insights.
Thanks to all who participated in the Webinar: Visibility at the Edge - Deep Insights from your API. In the last post, I talked about what we mean by visibilty at the edge of your business and the concept of 360 degrees of visibility. This time, I'll talk about the data that gets you the 360 degree view.
Thanks to all who participated in last week's Webinar: Visibility at the Edge - Deep Insights from your API. As promised on the Webinar, we'll write out some of the Q&A we got into in the live session. We'll start with what we mean by visibility at the edge and why we think it's important.
Thanks to all who participated in last week's strategy webinar: Visibility at the Edge - Deep Insights from your API. Thanks to our speakers @jhingran and @brianpagano. Here are the slides and video. Also, check out our follow-up posts this week in which our speakers further explore the topics of this Webinar hour.
As discussed in previous posts, it's important for app developers and API providers to understand how to protect users, apps, and APIs from abuse and how to deal with malicious attacks when they happen. It's also important to think about how to design protection systems to optimize impact on abusers while minimizing impact on legitimate users.
In my last post I looked at some of the ways malicious users can attack your apps and APIs and ways to mitigate the risk of attack. This time we'll look at some more ways to push back against attackers.
When a malicious user or app is detected, the user or the app can be blocked, throttled or denied service. The confidence in the "maliciousness" of an app or a user can be used to take service denial actions or even to reduce the QoS available for such users and apps. Similarly, end users should be notified about actions...