Software  >   Systems Software  >   Software Development Tools  >  

Application Programming Interfaces

RSS Feed   
ALSO CALLED: API, Application Program Interface, Application Program Interfaces
DEFINITION: An application program interface (API - and sometimes spelled application programming interface) is the specific method prescribed by a computer operating system or by an application program by which a programmer writing an application program can make requests of the operating system or another application.An API can be contrasted with a graphical user interface or a command interface (both of which  … 

Application Programming Interfaces definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Application Programming Interfaces Reports
1 - 25 of 144 Matches Previous Page  |  Next Page
Rethinking API Security
sponsored by Okta
VIDEO: APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.
Posted: 26 Mar 2020 | Premiered: 26 Mar 2020

Okta

Reference Huddle: How Pitney Bowes Solves Business Challenges with Okta
sponsored by Okta
WEBCAST: In this group reference call, Okta speaks with Kenn Bryant, Director of Architecture and SaaS Services at Pitney Bowes, about how they use Okta's APIs to deliver an unmatched customer experience, enable the company to leverage the cloud, and make critical business data more accessible to customers, employees, and partners.
Posted: 26 Mar 2020 | Premiered: Mar 26, 2020

Okta

Machine Learning for Finding Programming Defects and Anomalies
sponsored by Valbrio
WHITE PAPER: While static analysis tools can be useful for finding programming flaws and security vulnerabilities in code, they are beginning to be replaced by machine learning-driven tools that can anticipate flaws rather than scan for pre-determined ones. Read on to learn how machine learning is driving this new method of application design.
Posted: 06 Mar 2020 | Published: 25 Dec 2019

Valbrio

Machina Tools — SDKs
sponsored by Ionic Security
PRODUCT OVERVIEW: An issue plaguing today’s networks is the siloed approach to security and management, allowing hackers to exploit the gaps and enter your network. In this solution brief, take a closer look at Ionic’s Machina Tools, designed to close these gaps and unify your security strategy.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Ionic Security

Ultimate Guide to Bot Management
sponsored by Radware
EBOOK: Bots have completely revolutionized the way we interact digitally. In fact, bots account for more than half of all internet traffic. Unfortunately, some bots play a more sinister role – committing acts of fraud. In this e-book, explore the threats posed by malicious bots and discover tactics for detecting & mitigating these risks.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Radware

Javascript vs Javascript: Performance Penalty of Api Hooking
sponsored by Tala Security
WHITE PAPER: While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Tala Security

Pitney Bowes - Okta + F5 joint case study
sponsored by Okta
CASE STUDY: In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

API Security for Dummies
sponsored by Data Theorem
EBOOK: API Security for Dummies is a high-level introduction to the key concepts of API security and DevSecOps. Download now for an in-depth overview of the growth of the API economy, API security challenges (how to address them), and automation protection with DevSecOps.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Data Theorem

Okta + MuleSoft: Comprehensive API Access Control and Management
sponsored by Okta
DATA SHEET: As the most valuable APIs often contain sensitive data, the consequences of getting API security wrong can be significant. It’s critical to implement a solution that enables secure management and access control to your APIs. Read on to learn how Okta and MuleSoft deliver comprehensive API access control and management.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta

A Computer Weekly buyer's guide to next-generation programming tools
sponsored by ComputerWeekly.com
EGUIDE: All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

ComputerWeekly.com

Discover Hidden API Security Vulnerabilities and How to Defend Against Them
sponsored by Ping Identity Corporation
WHITE PAPER: Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Ping Identity Corporation

Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by ComputerWeekly.com
RESOURCE: This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Declaration by David Godkin with 218 exhibits – 17 May 2018
sponsored by ComputerWeekly.com
RESOURCE: A declaration by David Godkin, counsel for app developer Six4Three, producing 218 exhibits. The exhibits cover a wide range of material relating to Facebook, including news cuttings, press releases and blog posts. The exhibits present a timeline of what was publicly known and when.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Hype Cycle for Application Security, 2019
sponsored by Data Theorem
ANALYST REPORT: Download the 2019 version of Hype Cycle for Application Security to learn about app security technology on the rise, at the peak, sliding into the trough, and more.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Data Theorem

How to Automate API Security
sponsored by Data Theorem
WHITE PAPER: As software goes into production on a weekly, daily, and hourly basis, teams need to know if any APIs are vulnerable and be alerted to any changes in how it is being used. In this white paper, discover the benefits of automated API security, the problems with securing modern APIs, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Data Theorem

Data Theorem Interview Digital Anarchist RSA Conference 2019
sponsored by Data Theorem
VIDEO: In this interview from the 2019 RSA Conference, listen to Data Theorem's senior leaders, Himanshu Dwivedi and Doug Dooley, talk about the benefits of Data Theorem's newest API security product offerings.
Posted: 25 Jun 2019 | Premiered: 25 Jun 2019

Data Theorem

Webinar: Top 6 Security Needs for APIs and Serverless Apps
sponsored by Data Theorem
WEBCAST: In this webinar, discover the top 6 API security needs for APIs and apps across serverless platforms such as AWS Lambda, Google Cloud Functions and Azure Functions.
Posted: 12 Apr 2019 | Premiered: Apr 12, 2019

Data Theorem

Top 6 API Security Needs for Serverless Apps
sponsored by Data Theorem
WHITE PAPER: The growth in serverless apps is going to accelerate because the cost and time benefits for developers are overwhelmingly positive. However, the 6 areas in this white paper highlight the need for a new approach to security with an architecture that is substantially different than previous techniques. Read on to learn more.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Data Theorem

A Computer Weekly buyer's guide to the future of collaboration
sponsored by ComputerWeekly.com
EGUIDE: Businesses are using collaborative software to operate in revolutionary new ways. In this 13-page buyer's guide, Computer Weekly looks at its potential negatives, the improved agility it provides and assesses Chromebooks as collaboration clients
Posted: 25 Oct 2018 | Published: 25 Oct 2018

ComputerWeekly.com

A Computer Weekly buyer's guide to retail technology
sponsored by ComputerWeekly.com
EGUIDE: The retail industry is evolving alongside the emergence of new technologies. In this 15-page buyer's guide, Computer Weekly looks at how retailers are using AI, the importance of good digital customer experience and how mobiles have transformed the purchasing process.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

ComputerWeekly.com

Modernizing Legacy Applications Saves Bottom Lines
sponsored by ServiceNow
VIDEO: Since their legacy Lotus Notes environment was going to shutdown, which included over 200 custom apps, one company took a group of workers that had been developing ITIL and service management modules for years and transitioned them into a team that builds custom apps. Find out the benefits they realized from this process.
Posted: 26 Jan 2018 | Premiered: 19 Jan 2018

ServiceNow

Microservices: From Design to Deployment
sponsored by NGINX
EBOOK: Microservices architecture makes your apps more flexible, more stable, and faster. This e-book shows how to design, develop, and deliver microservices.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

NGINX

AI and Machine Learning: What's Next for ECM
sponsored by Box
EGUIDE: In this expert e-guide, we explore a flexible, AI-driven approach to cloud-based content management and collaboration. Learn about a platform designed to enable you to power content with machine learning, leverage smart search, modernize content-based processes, and more.
Posted: 02 Apr 2018 | Published: 29 Mar 2018

Box
1 - 25 of 144 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info