logo

Recent Posts of Platform selection

share-icon
high-quality API
13 June, 2023
share-icon
What makes up a high-quality API

Discover key characteristics of high-quality APIs for seamless integration and enhanced application functionality.

READ MORE
comment-icon0 Comments
share-icon
12 May, 2023
share-icon
8 Java Programming Tricks; Unlocking developer-led growth and How to Build a Fast and Lightweight API

In this Newsletter, you will find Java tricks you should know about, build lightweight APIs with NodeJS and learn the difference between Agile-VS-Scrum, the terms often used interchangeably in modern Software Product Lifecycle.

READ MORE
comment-icon0 Comments
share-icon
Custodial Wallets
02 May, 2023
share-icon
Why Custodial Wallets Remain Popular Among Some Crypto Users

For storing, transmitting, and receiving digital assets, cryptocurrency wallets are crucial tools. Custodial and non-custodial wallets are the two major varieties that are available. A third party, like an exchange, manages custodial wallets, whereas non-custodial wallets allow users complete control over their assets. Although non-custodial wallets have become more common, some bitcoin users still choose […]

READ MORE
comment-icon0 Comments
share-icon
Working in corporate
14 April, 2023
share-icon
Working in corporate to founding a developer first company

Last month I got a chance to sit and talk with Darshan Shivashankar, founder and CEO of APIWiz on our brand new podcast. We two have collaborated in the past on API lifecycle management workshop and Darshan being a technical founder, whenever we talk our conversations tend to go in all places technical. So catch up on everything we discussed in this 50 minutes episode but here’s a quick summary or gist if you will for someone who needs more buy in before lending the episode their ears.

READ MORE
comment-icon0 Comments
share-icon
protecting APIs
04 April, 2023
share-icon
Protecting APIs by Merging Tools and Security Best Practices

Rapid uptake in adoption by industries ranging from banking to retail to autonomous vehicles of customer- and partner-facing and internal application programming interfaces (APIs) to drive internet traffic has resulted in an equally rapid growth in endpoint attacks – more than 11 billion over just 18 months according to a report from edge computing security leader Akamai. It makes sense that they are more vulnerable to threats from malicious actors, given API endpoints’ similarity to internet-facing web servers, and their role as pipelines between divergent platforms.

READ MORE
comment-icon0 Comments
share-icon
04 April, 2023
share-icon
Taking a Proactive, Governance-Based Approach to API Security

Security breaches are among the greatest threats confronting enterprises today, and application programming interface (API) abuse is typically central to the attacks. For that reason, API governance is critical to the success of any digital business.

READ MORE
comment-icon0 Comments
share-icon
13 February, 2023
share-icon
Debugging Techniques For Python Developers

Without knowing how to debug code, developers will face endless hours of frustration trying to solve problems.

READ MORE
comment-icon0 Comments
share-icon
20 September, 2022
share-icon
The Importance and Benefits of using Multi-Factor Authentication (MFA)

In this article, we’ll discuss everything you need to know about the importance of implementing MFA into your day-to-day online activity.

READ MORE
comment-icon0 Comments
share-icon
07 September, 2022
share-icon
A Beginners Guide To Crypto Wallets

Blockchain technology has made digital currency transactions increasingly useful, practical and accessible. However, as the number of crypto users has gone up, so has the rate of cyber theft related to cryptocurrencies.

READ MORE
comment-icon0 Comments
share-icon
07 September, 2022
share-icon
Managing software project dependencies with git submodules

Sooner than later developers can find their code depending on software projects of other developers which are either open source, hosted online or being developed in-house, in maybe another department of the organisation. These dependencies are also evolving, and need  to be updated and in sync with your main source tree. This ensures that a small change breaks nothing and your project is not outdated and does not have  any known security vulnerability or bugs.

READ MORE
comment-icon0 Comments
Contact us
Swan Buildings (1st floor)
20 Swan Street
Manchester, M4 5JW
+441612400603
community@developernation.net
Home
Community
Research Program
Blog
Partner Network
Referrers
Partners
Affiliates

SlashData © Copyright 2024| All rights reserved |Cookie Policy |Privacy Policy