techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

5.4K
active users

#apis

17 posts17 participants0 posts today

Ei vain #Apulanta *, vaan nyt myös #AkiRoukala yhtiöineen. #Lördag on ostanut Idmanin huvilan Tampereella puolella miltsillä, ja suunnittelee siitä kulttuurikeskusta.

"Sinne suunnitellaan residenssiä, luovien alojen yritysten tiloja sekä myös kahvilasta ja viinibaarista on ollut puhetta."

* #Apis on ostanut mm. #HennalanKasarmit Lahes ja Insinööritalon Tampereella.

#Roukala #musiikki #musiikkiala #kulttuuri #taide #Tampere #Manse #IdmaninHuvila #kulttuuriperintö

yle.fi/a/74-20153847

Yle Uutiset · Levy-yhtiö ostaa Tampereella sijaitsevan Idmanin huvilanLördag oy on tehnyt Tampereen kaupungin hyväksymän tarjouksen Hatanpäällä sijaitsevasta Idmanin huvilasta. Kauppahinta on 500 000 euroa.

"API keys are foundational elements for authentication, but relying solely on them is inherently a risky proposal.

Firstly, there’s the reality that API keys are not securely designed — they were never meant to be used as the sole form of authentication, and as such, they aren’t really built for the task. These keys can often be easily stolen, leaked, or, in some cases (especially if generated incrementally), outright guessed. An API key is suitable for tracking usage but is poor for security.

There is also the additional reality that keys in their default state lack some critical functionality. There’s not a lot of verification built-in for identity management, and what does exist offers very little in the way of granular access control.

Ultimately, solely relying on API keys is a mistake common with novice developers but frighteningly common even in advanced products.

Best Practices
Instead of relying heavily on API keys as a sole mechanism, combine those keys with additional approaches such as OAuth 2.0 or mTLS. Implement rigorous expiration and rotation policies to ensure that keys which are made public are only useful for a short amount of time. Consider more advanced approaches, such as IP whitelisting or device fingerprinting, to add another layer of security atop the API key process."

nordicapis.com/9-signs-youre-d

Nordic APIs · 9 Signs You're Doing API Security Wrong | Nordic APIs |API security anti-patterns are common. From overreliance on API keys to a lack of rate limiting to no encryption, we explore the top ones.

Nieuwe versie developer.overheid.nl live

De vernieuwde developer.overheid.nl is live. Dit platform helpt ontwikkelaars binnen de overheid om efficiënter te werken met digitale tools, standaarden en API’s (Application Programming Interface). De update maakt het portaal toegankelijker en gebruiksvriendelijker. Overheidsorganisaties kunnen hier eenvoudiger samenwerken en bestaande oplossingen hergebruiken.

Veel overheden ontwikkelen namelijk vergelijkbare digitale diensten, zoals formulieren voor vergunningaanvragen of inlogsystemen. Op developer.overheid.nl staan hergebruik en innovatie centraal. Ontwikkelaars vinden nu makkelijker kant-en-klare API’s en SDK’s (Software Development Kit) om deze diensten sneller en veiliger te bouwen. Dit voorkomt dubbel werk en bespaart tijd en kosten.

Nieuwe kennisbank met praktijkvoorbeelden

Een belangrijke toevoeging is de kennisbank, waarin standaarden, tools en best practices worden gebundeld. Denk aan richtlijnen voor het veilig gebruiken van open source of voorbeelden van succesvolle samenwerkingen, zoals de herbruikbare open source code voor gemeentelijke websiteformulieren.

Community en samenwerking

Het platform stimuleert samenwerking tussen overheidsontwikkelaars. Teams kunnen ervaringen delen, elkaar helpen bij technische uitdagingen en samen nieuwe toepassingen ontwikkelen. Zo profiteren alle overheidsorganisaties van elkaars kennis en oplossingen.

Meer informatie

Lees het volledige nieuwsbericht op developer.overheid.nl.

Dit is een automatisch geplaatst bericht. Vragen of opmerkingen kun je richten aan @DigitaleOverheid@social.overheid.nl

Ah yes, the shocking revelation that #LLMs aren't magic wizards solving business logic problems. 🤯 Who knew AI chatbots weren't the secret sauce for world domination? 🧙‍♂️ Stick to #APIs, unless you enjoy watching your project self-destruct in spectacular fashion. 💥
sgnt.ai/p/hell-out-of-llms/ #AIchatbots #BusinessLogic #ProjectManagement #TechHumor #HackerNews #ngated

sgnt.aiGet the hell out of the LLM as soon as possible | sgnt.aiDon’t let an LLM make decisions or implement business logic: they suck at that.

"Let me be blunt.

If your startup offers APIs and you don’t have a portal, you’re lighting developer acquisition money on fire. 💵 🧯🚒

Here’s what a good portal actually does:

Shortens time-to-value: faster POCs, faster adoption.

Reduces support tickets: devs can find what they need.

Builds trust: your API feels stable, documented, and ready.

Increases conversion: when docs show how easy it is to integrate, not just tell.

Still sending PDF onboarding packets to partners?

C’mon, boo. 🥲"

quetzalliwrites.com/newsletter

Quetzalli WritesQuetzalli Writes | Educational Tech Content & Ghostwriting¡Hola, Tech Writing Friends! Your API is powerful. Even your docs are pretty decent. But… where the hell is your developer portal ? If you’re shipping APIs and expecting developers to magically integrate without a centralized place to get credentials, try out endpoints, or even find updated gui

"The accompanying diagram is intended to help you quickly decide how to document an API, but particularly a REST API. The first split is just to make sure you are looking for the right kind of API.

Here is some more context to help you decide on an approach and get started."

gist.github.com/briandominick/

API Documentation Decision Matrix. GitHub Gist: instantly share code, notes, and snippets.
GistAPI Documentation Decision MatrixAPI Documentation Decision Matrix. GitHub Gist: instantly share code, notes, and snippets.
#API#APIs#APIDesign

#APIs act as digital portals that allow data to travel between applications. 🕳️ However, as sensitive data moves from one application to another, each API becomes a potential access point that threat actors can exploit. 😬

🔒 Securing APIs is critical to any company's data protection program, and knowing the OWASP API security top 10 will help! 🔟 🙌

Read on an learn about:
❓ Who OWASP is
⚠️ The 10 most critical API security risks based on several data points
🔓 The OWASP top 10 API security risks

graylog.org/post/an-introducti #cybersecurity #infosec #APIsecurity #GraylogLabs