Software  >   Systems Software  >   Software Development Tools  >  

Application Programming Interfaces

RSS Feed   
ALSO CALLED: API, Application Program Interface, Application Program Interfaces
DEFINITION: An application program interface (API - and sometimes spelled application programming interface) is the specific method prescribed by a computer operating system or by an application program by which a programmer writing an application program can make requests of the operating system or another application.An API can be contrasted with a graphical user interface or a command interface (both of which  … 

Application Programming Interfaces definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Application Programming Interfaces Reports
1 - 25 of 145 Matches Previous Page  |  Next Page
What Does an Effective API Strategy Look Like?
sponsored by Okta
WHITE PAPER: APIs are here to stay – but that doesn’t mean that APIs are as secure as they need to be. While APIs drastically improve data integration and software development, they’re also largely susceptible to security threats, such as data breaches. Understand the full API lifecycle by reading Okta’s white paper now.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Okta

Strengthen your Financial API Security
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper highlights several areas of concern around API security within your financial enterprise, including access control, data governance and consent management, visibility into the activity of your applications, auditing and forensics. Read on to gain a deeper understanding of API security threats and how to build a solid defense.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Ping Identity Corporation

Consumer Data Right: Open Banking
sponsored by Ping Identity Corporation
DATA SHEET: With consumers growing increasingly reliant on digital services and interfaces, the financial industry is evolving to meet these expectations through open banking interfaces. In this solution brief, explore the Ping Identity Platform, designed to meet Australia’s Open Banking requirements while still providing a seamless user experience.
Posted: 15 Nov 2019 | Published: 16 Aug 2019

Ping Identity Corporation

The Dark Side of the API Economy
sponsored by Ping Identity Corporation
WHITE PAPER: Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners. Collectively this emerging trend is referred to as the API Economy. In this white paper, KuppingerCole Analysts provide key recommendations on designing a comprehensive and future-proof API security strategy.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Ping Identity Corporation

Access Management Vendors: Analyst Report
sponsored by IBM
RESOURCE: SaaS-delivered access management has become the norm, and vendors are including API capabilities for integrating authentication and authorization into applications and services. Gartner recently published a Magic Quadrant report for Access Management, which evaluates and compares various AM providers. Read on to learn more.
Posted: 14 Nov 2019 | Published: 12 Aug 2019

IBM

Discover Hidden API Security Vulnerabilities and How to Defend Against Them
sponsored by Ping Identity Corporation
WHITE PAPER: Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Ping Identity Corporation

Asia-Pacific Cloud Security Study
sponsored by Palo Alto Networks
WHITE PAPER: A recently released study by Palo Alto Networks uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific, including many cases where perception doesn’t match the reality of professionals who know best. Download the report to dive deeper into the research.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Palo Alto Networks

Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by ComputerWeekly.com
RESOURCE: This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Declaration by David Godkin with 218 exhibits – 17 May 2018
sponsored by ComputerWeekly.com
RESOURCE: A declaration by David Godkin, counsel for app developer Six4Three, producing 218 exhibits. The exhibits cover a wide range of material relating to Facebook, including news cuttings, press releases and blog posts. The exhibits present a timeline of what was publicly known and when.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Employing Application Identities to Secure Server Workloads with Aporeto
sponsored by Aporeto
ANALYST REPORT: Learn how Aporeto takes an application identity-based approach well aligned with the attributes of modern infrastructure to protect hybrid clouds from unauthorized access, a range of vulnerabilities, and threats.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

Aporeto

Hype Cycle for Application Security, 2019
sponsored by Data Theorem
ANALYST REPORT: Download the 2019 version of Hype Cycle for Application Security to learn about app security technology on the rise, at the peak, sliding into the trough, and more.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Data Theorem

How to Automate API Security
sponsored by Data Theorem
WHITE PAPER: As software goes into production on a weekly, daily, and hourly basis, teams need to know if any APIs are vulnerable and be alerted to any changes in how it is being used. In this white paper, discover the benefits of automated API security, the problems with securing modern APIs, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Data Theorem

Data Theorem Interview Digital Anarchist RSA Conference 2019
sponsored by Data Theorem
VIDEO: In this interview from the 2019 RSA Conference, listen to Data Theorem's senior leaders, Himanshu Dwivedi and Doug Dooley, talk about the benefits of Data Theorem's newest API security product offerings.
Posted: 25 Jun 2019 | Premiered: 25 Jun 2019

Data Theorem

Webinar: Top 6 Security Needs for APIs and Serverless Apps
sponsored by Data Theorem
WEBCAST: In this webinar, discover the top 6 API security needs for APIs and apps across serverless platforms such as AWS Lambda, Google Cloud Functions and Azure Functions.
Posted: 12 Apr 2019 | Premiered: Apr 12, 2019

Data Theorem

Top 6 API Security Needs for Serverless Apps
sponsored by Data Theorem
WHITE PAPER: The growth in serverless apps is going to accelerate because the cost and time benefits for developers are overwhelmingly positive. However, the 6 areas in this white paper highlight the need for a new approach to security with an architecture that is substantially different than previous techniques. Read on to learn more.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Data Theorem

A Computer Weekly buyer's guide to the future of collaboration
sponsored by ComputerWeekly.com
EGUIDE: Businesses are using collaborative software to operate in revolutionary new ways. In this 13-page buyer's guide, Computer Weekly looks at its potential negatives, the improved agility it provides and assesses Chromebooks as collaboration clients
Posted: 25 Oct 2018 | Published: 25 Oct 2018

ComputerWeekly.com

A Computer Weekly buyer's guide to retail technology
sponsored by ComputerWeekly.com
EGUIDE: The retail industry is evolving alongside the emergence of new technologies. In this 15-page buyer's guide, Computer Weekly looks at how retailers are using AI, the importance of good digital customer experience and how mobiles have transformed the purchasing process.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

ComputerWeekly.com

Enterprise Integration Platform as a Service: Vendor Comparison
sponsored by SnapLogic
RESEARCH CONTENT: In this Gartner Magic Quadrant report, explore the current field of enterprise integration PaaS (iPaaS) offerings and what they entail for a variety of app and data integration use cases.
Posted: 25 Apr 2018 | Published: 18 Apr 2018

SnapLogic

Emerging Trends in Modern Data Integration
sponsored by Information Builders
WHITE PAPER: This white paper examines some of the modern integration techniques that are emerging in response to trends like big data, advanced analytics, and IoT. Find out which technologies are shaping today's data integration tools, including data lakes, cloud, APIs, and more.
Posted: 04 Apr 2018 | Published: 31 Dec 2017

Information Builders

Modernizing Legacy Applications Saves Bottom Lines
sponsored by ServiceNow
VIDEO: Since their legacy Lotus Notes environment was going to shutdown, which included over 200 custom apps, one company took a group of workers that had been developing ITIL and service management modules for years and transitioned them into a team that builds custom apps. Find out the benefits they realized from this process.
Posted: 26 Jan 2018 | Premiered: 19 Jan 2018

ServiceNow

Applying Secure Design Patterns to Microservices Development
sponsored by WhiteHat Security
VIDEO: From a developer's perspective, find out what you can do to improve app security for microservices-based development so that you can find and resolve issues even as you continuously release and iterate code.
Posted: 25 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

AI and Machine Learning: What's Next for ECM
sponsored by Box
EGUIDE: In this expert e-guide, we explore a flexible, AI-driven approach to cloud-based content management and collaboration. Learn about a platform designed to enable you to power content with machine learning, leverage smart search, modernize content-based processes, and more.
Posted: 02 Apr 2018 | Published: 29 Mar 2018

Box

Migrating Legacy Apps to the Cloud
sponsored by Oracle Corporation
EGUIDE: It is time to move your legacy applications to the cloud. Migrating the applications you rely on every day is going to be unique to your organization, but not as complicated as you may have been lead to believe. Use this e-guide to navigate your path to the cloud.
Posted: 18 Dec 2017 | Published: 11 Dec 2017

Oracle Corporation
1 - 25 of 145 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement