An application programming interface (API) is the specification for which software is meant to be used by other software.
-3
votes
0answers
38 views
Architecture for various api parsing and managing it in one app [on hold]
Updated after some comments -
I am fetching data from multiple sports api from different sources, and data is in different format given various sources and different sport. I want to know if I can ...
-2
votes
0answers
36 views
Is there an online permission (eg: RBAC) APIs service? [closed]
Is there an online permission (eg: RBAC) APIs service I can apply in my app to implement user permission control jobs?
Thanks in advance.
1
vote
0answers
55 views
Returning view code in an API response
I have an API that returns a JSON formatted array of users within a given pair of lat/ long bounds.
I'm using this data to plot a number of markers on a map, based on the location of each user.
I ...
17
votes
8answers
683 views
API design: concrete vs. abstract approach - best practices?
When discussing APIs between systems (on the business level) there are often two different point of views in our team: some people prefer a more - lets say - generic abstract approach, other a ...
-3
votes
0answers
38 views
Facebook API integration in java to fetch the comments about products [closed]
i want to fetch N number of users wall post or comments about a product from facebook using facebook graph API. do i need to have authorization to do that ? if i want then how can i do it?
i want to ...
2
votes
2answers
210 views
When using your own API (Dog Fooding). How do you avoid giving away the secret key?
I read this article on soundcloud's api:
http://backstage.soundcloud.com/2011/08/soundcloud-mobile-proxies/
It talks about consuming your own API.
What I don't understand is how they avoid giving ...
-1
votes
0answers
34 views
calling C dll file from VB6 for reading data via RFID head [migrated]
i'm an electrical engineering student.
Unfortunately I have a programming problem.
in my project, I have to make the decoding of palettes, that contain chips (chips have a memory of 129 characters), ...
1
vote
2answers
139 views
Is it safe to transmit access tokens via HTTP headers?
It's the first RESTful web service and I am concerned about security issues. Is it safe to transmit my access token via HTTP headers? For example:
POST /v1/i/resource HTTP/1.1
Content-Type: ...
2
votes
1answer
157 views
Is it legal to imitate how an API looks? [closed]
I want to make an open-source graph thing which looks and behaves very similarly to Google Visualization API, but it would be based on Flot. Is this legal, or must I not imitate Google Visualization ...
3
votes
2answers
136 views
What is the appropriate approach to study an api when it is not well documented and there are no good tutorials around?
I am a student and I like to develop applications at my own level. While building an application I am the only one in my team.
After analyzing the application I choose a library/api to use for the ...
0
votes
1answer
59 views
Is there an API I can use to get access to map data? [closed]
A customer would like me to build them an intranet web site with mapping information. For example, maps such as the ones on Google Maps. I looked at the Google Maps API, but their "free use" license ...
3
votes
1answer
60 views
Modelling REST endpoints with data that not all users have access to
I am trying to figure out the best way around a small problem i have with a design for a Hypermedia API i am currently building.
I have a notion of a site, very simple doesn't have much going on and ...
8
votes
6answers
369 views
Is it better to have one method that takes a bool as a parameter or two methods with different names? [duplicate]
I'm writing a factory class for a Selenium Web Driver and I came across a choice that I couldn't figure out which is cleaner. Having two methods with the same parameter.
GetWebDriver(string browser)
...
4
votes
2answers
170 views
What can REST API do that a API using HTTP URL query strings cannot do?
I'm learning about REST and had the chance to build a basic REST API. After doing so, most of the material I read was internalized and I now have a better understanding of it.
However, I do not ...
51
votes
8answers
1k views
Strategy for keeping secret info such as API keys out of source control?
I'm working on a website that will allow users to log in using OAuth credentials from the likes of Twitter, Google, etc. To do this, I have to register with these various providers and get a ...