The Internet of Things (IoT) promises to help businesses make better decisions and improve products, processes and customer service. But this will only work if businesses can securely access and share relevant data. This is why we need data-as-a-service (DaaS).
Tumblr had to act quickly last month when it was revealed that its iOS apps were passing user names and passwords in the clear over public wi-fi networks. We’ve been down this road before with LinkedIn, LivingSocial and others. So why do we keep having these incidents?
So you’ve accepted BYOD and a host of new apps to support. Congrats! The next step is making sure that your crucial mobile data is adequately secured before all hell breaks loose. This article by Matt McLarty explains why and how.
At the API Academy, we make a habit of studying APIs and discussing them to get better at our craft. We usually do this in private and behind closed doors but ProgrammableWeb gave me an opportunity to write up a public review of the Box API and I’m happy to have the opportunity to write another. This time, we will be delving into eBay’s set of APIs.
This article talks briefly about the concept of using hypermedia as an application programming interface (API) and how to design a hypermedia type to use as a basis for your API. It also covers the work of mapping your particular problem domain to hypermedia messages and documenting your design.
For information technology, this is the age of APIs. But knowing where to start can be the biggest challenge. What services should my API offer? Can it generate revenue? What will motivate developers to use my API? Read on for tips and best practices from the Web’s giants.
The bring-your-own-device (BYOD) movement has gained unstoppable momentum. And thanks to the burgeoning mobile app market, employees have high expectations for these tools. This article explains why companies need to invest in building apps.
Being a leader means being prepared. IT has a great opportunity to help their business partners realize the productivity and cost benefits of BYOD while mitigating the new risks, most notably around security. This article outlines five steps that IT leaders can take to prepare for a positive BYOD transformation.