Digests » 376
Customer Data Infrastructure, offering Segment API compatibility, multiple hosting options, fixed infrastructure based pricing & powerful real time transformations.
When designing systems that enable secure authentication and authorization for API access, you must consider how your applications and users should authenticate themselves. In this article, we’ll compare three different ways to achieve this: API Keys, HTTP Basic Authentication, and OAuth. We’ll also highlight what the benefits and drawbacks are for each method.
There are many use cases where NoSQL is a correct alternative, but moving from a relational database system to a key-value store because you heard that “joins don’t scale” is probably not a good reason. You should choose a solution for the features it offers (the problem it solves), and not because you ignore what you current platform is capable of.
Nowadays, automated testing is embedded so deeply within our perception of software development, it’s hard to imagine one without the other. And since that ultimately enables us to produce software quickly without sacrificing quality, it’s hard to argue that it’s not a good thing.
Building long-lasting, maintainable, systems requires not only communicating with computers, but also communicating in space with other people, and in time with our future selves. Communicating, recording, and indexing the intent behind our designs is an important part of that picture. Make time for it, or regret it later.
A user-friendly command-line HTTP client for the API era. It comes with JSON support, syntax highlighting, persistent sessions, wget-like downloads, plugins, and more.
DevOps is done a little differently in the cloud. Are you prepared to tackle those nuances? Join Headspring on Thursday, July 16 at 12pm CDT to learn a real-world approach that's not just about checking off boxes. They'll demo DevOps processes in both Azure and AWS and equip you to start delivering value faster. Register today!