<?xml version="1.0" encoding="utf-8"?><rss version="2.0"><channel><title>Brenton House - Digital Strategist and Influencer</title><link>https://weblogs.asp.net:443/bhouse/</link><description>Brenton House is an API Evangelist and Strategist with 25+ years of experience in the Digital Transformation world. He has worked with many clients across various industries including broadcasting, advertising, retail, financial services, supply chain, transportation, technology, and publishing. His passion for everything API together with his integration strategy and design experience, enable him to help organizations create captivating products that inspire and delight audiences.</description><item><title>Understanding API First Strategy and Benefits</title><link>https://weblogs.asp.net:443/bhouse/understanding-api-first-strategy-and-benefits</link><description>&lt;p&gt;&lt;img src="https://aspblogs.blob.core.windows.net:443/media/bhouse/Media/understanding-api-first-strategy-2.jpg" alt="What is an API First Strategy" /&gt;&lt;/p&gt;
&lt;h2&gt;What is an API First Strategy?&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;API First is more than building an API for every product you have.  API First is a strategic and tactical methodology for how you view your products and your business and about adopting a mindset where your products are capabilities that you can deliver.  API First focuses on the business value of APIs and what they deliver.&lt;/p&gt;
&lt;p&gt;An API First and API-led Integration Strategy is essential to every organization. The companies that are adopting an API First Strategy are the ones that are gaining ground the quickest in the growing API Economy.  API First allows you to view your business as a set of API Products that work together to provide the features, data, and capabilities that your organization's products produce.&lt;/p&gt;
&lt;p&gt;APIs are what enable businesses to engage with consumers in the digital world and are how your products are going to be judged in the API Economy.&lt;/p&gt;
&lt;p&gt;How fast are things moving in the API Economy?  Let's take a look.&lt;/p&gt;
&lt;h3&gt;What happens in a minute?&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;A lot can happen in a minute.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;In a single minute:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;UPS will deliver 11,319 packages&lt;/p&gt;
&lt;p&gt;Apple will make a little over $70k dollars&lt;/p&gt;
&lt;p&gt;In a single minute, over $3 million dollars will be donated to charities around the world.&lt;/p&gt;
&lt;p&gt;In the next 60 seconds, over 700K telephone calls will be made.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;60 seconds is not a lot of time but it is enough time for a lot to happen.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;A lot can also happen in a digital minute&lt;/h3&gt;
&lt;p&gt;In fact, according to the &lt;a href="https://www.domo.com/blog/what-data-never-sleeps-9-0-proves-about-the-pandemic/"&gt;2021 results compiled by Domo&lt;/a&gt;, a lot &lt;strong&gt;DOES&lt;/strong&gt; happen in a digital minute.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;These are some pretty big numbers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For instance, in the next &lt;code&gt;60 seconds&lt;/code&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;People watch &lt;strong&gt;&lt;code&gt;694K hours&lt;/code&gt;&lt;/strong&gt; of videos on YouTube&lt;/li&gt;
&lt;li&gt;Twitter users post &lt;strong&gt;&lt;code&gt;575k tweets&lt;/code&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Slack users send &lt;strong&gt;&lt;code&gt;148k messages&lt;/code&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Users stream &lt;strong&gt;&lt;code&gt;452k hours&lt;/code&gt;&lt;/strong&gt; of video on Netflix&lt;/li&gt;
&lt;li&gt;Google conducts &lt;strong&gt;&lt;code&gt;5.7M searches&lt;/code&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;code&gt;12M people&lt;/code&gt;&lt;/strong&gt; send an iMessage&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;code&gt;6M people&lt;/code&gt;&lt;/strong&gt; shop online&lt;/li&gt;
&lt;li&gt;Users send &lt;strong&gt;&lt;code&gt;2M SnapChats&lt;/code&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;People watch &lt;strong&gt;&lt;code&gt;167M videos&lt;/code&gt;&lt;/strong&gt; on TikTok&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The list goes on and on but there is one thing in common.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;All of these services (and more!) are powered by APIs.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr /&gt;
&lt;p&gt;Finish reading the full post here 👉  &lt;a href="https://brenton.house/api-first-strategy-7544fb11f00c"&gt;API Strategy Explained with Brenton House&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Mon, 31 Jan 2022 19:53:17 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/understanding-api-first-strategy-and-benefits</guid><category>api</category><category>api strategy</category><category>api first</category><category>api economy</category><category>api management</category><category>houserules</category></item><item><title>Frankenstein APIs Explained! - API Cyber Security Series</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/frankenstein-apis-explained</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-frankenstein-thumbnail.png" alt="What is a Frankenstein API? - API Security and Cybersecurity" /&gt;&lt;/p&gt;
&lt;h1&gt;&lt;a href="https://brenton.house/what-is-a-frankenstein-api-4d6e59fca6"&gt;Frankenstein APIs Explained!&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Unknown APIs can be scary but not every API is a monster.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This is part of the &lt;a href="https://www.youtube.com/watch?v=6LP_3FZDiPU&amp;amp;list=PLKUnjn-fSXRTy8sPPXGrNNBDPVOOi3U49"&gt;API Cybersecurity 101 series by Software AG's Senior API Strategist, Brenton House&lt;/a&gt;. A continuing series on API Security and Cybersecurity.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;You may have never heard of a &lt;strong&gt;Frankenstein API&lt;/strong&gt;.  But there is a good chance you have used one at some point.   It is important to know what a Frankenstein API is because your API Security could depend on it.&lt;/p&gt;
&lt;p&gt;A &lt;strong&gt;Frankenstein API&lt;/strong&gt; is one that is created in the deepest depths of a dark and secret laboratory.&lt;/p&gt;
&lt;p&gt;No.  Not really.&lt;/p&gt;
&lt;p&gt;But this type of API is usually creatively pieced together using unorthodox methods and is driven by a strong need for functionality.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;So let’s start with the basics.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;h3&gt;What is an API?&lt;/h3&gt;
&lt;p&gt;The acronym API stands for Application Programming Interface. Basically, it is non-human systems (or applications) that talk to each other in an agreed-upon way! Most often, people are talking about Web APIs, which include things like REST, GraphQL, gRPC, SOAP, etc. The introduction of smartphones caused an exponential growth and adoption of APIs as pretty much every single mobile application uses APIs.&lt;/p&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;h3&gt;What is API Security?&lt;/h3&gt;
&lt;p&gt;The simple answer is that it is about applying and managing security for your APIs but we all know, there is &lt;a href="https://brenton.house/what-is-api-security-5ca8117d4911"&gt;nothing simple about API Security&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;There are 7 basic categories for APIs.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Public APIs&lt;/li&gt;
&lt;li&gt;Internal APIs&lt;/li&gt;
&lt;li&gt;Partner APIs&lt;/li&gt;
&lt;li&gt;Composite APIs&lt;/li&gt;
&lt;li&gt;Shadow APIs&lt;/li&gt;
&lt;li&gt;Zombie APIs&lt;/li&gt;
&lt;li&gt;Frankenstein APIs&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;&lt;code&gt;So what is a Frankenstein API?&lt;/code&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr /&gt;
&lt;iframe width="425" height="350" src="//www.youtube.com/embed/-MlDgkJg9xU"&gt;&lt;/iframe&gt;
&lt;p&gt;What happens when you really need an API for something and that API does not exist?&lt;/p&gt;
&lt;p&gt;Take for instance Google Public Search Results (SERP) API.  Have you ever used it?&lt;/p&gt;
&lt;p&gt;Me neither.  It doesn't exist.&lt;/p&gt;
&lt;p&gt;That doesn't mean that people don't need APIs like this though.  You may have used services that provide APIs to show you how your website (and the websites of others) rank for certain keywords and queries.&lt;/p&gt;
&lt;p&gt;Another example might be where a web application product has an API but it is very limited and doesn't provide access to all the information and functionality that the corresponding web application does.&lt;/p&gt;
&lt;p&gt;This is another example where someone might end up building an API.&lt;/p&gt;
&lt;p&gt;Now when I say building, I really mean piecing/hacking/cobbling it together using unorthodox and unconventional methods such as screen scraping and other techniques.  When done right, these can provide the valuable data that wasn't provided by the original product but it comes with many risks...&lt;/p&gt;
&lt;p&gt;Some of the risks to be concerned about stem from the fact that this API was not created by the same organization that created the original product.&lt;/p&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;h2&gt;Frankenstein APIs can be extremely fragile&lt;/h2&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;p&gt;A &lt;strong&gt;Frankenstein API&lt;/strong&gt; does not have the insider information needed to make the API stable and durable.  For instance, ~~if~~ (sorry, WHEN, not if)  Google were to change how search engine results were laid out or presented, then every Frankenstein API that was created by scraping the Google Search Engine Results Pages (SERP) would most likely break (depending on the how major the changes were).&lt;/p&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;h2&gt;Frankenstein APIs can bypass product security&lt;/h2&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;p&gt;If a &lt;strong&gt;Frankenstein API&lt;/strong&gt; was created to fill the gap created by missing features in the original product, it is very possible that the mechanism for scraping the data and compiling it into an API would be bypassing security.  What I mean by that is the resulting &lt;strong&gt;Frankenstein API&lt;/strong&gt; would not require the same security that the scraping tool (or another mechanism) was required to provide in order to retrieve the data from the original application.&lt;/p&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;h2&gt;Frankenstein APIs can cause undue load on resources&lt;/h2&gt;
&lt;p&gt;There is no guarantee on the experience level of the developer (or developers) that creates a &lt;strong&gt;Frankenstein API&lt;/strong&gt;.  Since they are not part of the organization that created the original application, the techniques used to &amp;quot;retrieve&amp;quot; the data may be, well... less than optimized.   The code in a &lt;strong&gt;Frankenstein API&lt;/strong&gt; could be eating up all kinds of resources owned by the original application owner.  Calls could be taxing servers, bandwidth, and other resources that all result in lots of money.&lt;/p&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;h2&gt;Frankenstein APIs could expose vulnerabilities&lt;/h2&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;p&gt;This one is not strictly limited to &lt;strong&gt;Frankenstein APIs&lt;/strong&gt; but you could be asking for problems.  Once you have an external developer or hacker digging through your applications looking for a way to capture the data they need, they could discover vulnerabilities in your system that would not have been found otherwise.   Vulnerabilities can be found by hackers not creating &lt;strong&gt;Frankenstein APIs&lt;/strong&gt; but it would be wise to not create more opportunities.&lt;/p&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;API First to the rescue&lt;/h2&gt;
&lt;p&gt;A solid API First strategy can be helpful in avoiding some of the problems that arise due to Frankenstein APIs.  If your organization treats APIs like a Product and always creates an API First, BEFORE creating an application, you can &lt;a href="https://brenton.house/what-is-api-security-5ca8117d4911"&gt;engineer security into a proper API&lt;/a&gt;, thus alleviating the need for a Frankenstein API.&lt;/p&gt;
&lt;p&gt; 
 &lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;NO API FOR YOU!!&lt;/h2&gt;
&lt;p&gt;If you absolutely insist on not providing an API for the users of your applications, you will need to take precautions.  By the way, &lt;strong&gt;I DO NOT recommend this option!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;You will need to have very advanced mechanisms in place to protect your web applications (and other sources of data) from screen scraping and other data retrieval mechanisms.  This can be tough to do and you will have to be constantly changing it in order to keep of with the latest data retrieval techniques.&lt;/p&gt;
&lt;p&gt;This is not to say that you don't need to protect against screen scraping if also provide an API but it may remove a lot of the motivation for creating a Frankenstein API if you provide a proper API along with your application.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;I am not saying Frankenstein APIs are bad, more misunderstood.&lt;/p&gt;
&lt;p&gt;My point is for you to be aware that they exist and to treat them with care, especially in terms of API Security.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About Brenton House&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://blog.softwareag.com/author/brenton-house"&gt;Brenton House is Vice President of Digital Evangelism at Software AG.&lt;/a&gt;  As an API and Digital Transformation Evangelist and Strategist, he has connected enterprises with API solutions and microservices, to help drive innovation and overall business growth for many organizations.&lt;/p&gt;
&lt;p&gt;In his 25+ years of experience, he has worked across many industries including broadcasting, advertising, retail, financial services, supply chain, transportation, technology, and publishing -- gaining a breadth of knowledge on all things APIs and Integrations.  His diverse experience set and unique creative skill sets have enabled him to equip organizations in creating captivating and innovative products that delight users.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://linkedin.com/in/brentonhouse"&gt;👉    Connect with Brenton House on LinkedIn!    👈&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Check out some of our other resources to continue learning more about APIs and Integrations!&lt;/h3&gt;
&lt;p&gt;⭐     Software AG Blog ▪ https://blog.softwareag.com&lt;br /&gt;
⭐     API Knowledge Portal ▪ https://knowledge.softwareag.com&lt;br /&gt;
⭐     Software AG Tech Community ▪ https://techcommunity.softwareag.com/&lt;br /&gt;
🎬     Software AG YouTube Channel ▪ https://youtube.com/softwareag&lt;br /&gt;
🎬     Brenton House's YouTube Channel ▪ https://youtube.com/brentonhouse&lt;br /&gt;
🎬     API Shorts YouTube Channel ▪ https://youtube.com/apishorts&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;👇👇👇    FREE online API Maturity assessment here!    👇👇👇&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;https://www.softwareag.com/api-maturity&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt; 
 
 
 
 
 &lt;/p&gt;
</description><pubDate>Thu, 30 Dec 2021 20:24:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/frankenstein-apis-explained</guid></item><item><title>API Security 101 - Cyber Security Explained</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-security-101-cyber-security-explained</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-security-thumbnail.png" alt="API Security and Cybersecurity 101 with Brenton House" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;A day doesn't go by where some API is in the news because of a vulnerability or leaked data.&amp;nbsp; More than ever before, organizations are placing a renewed emphasis on API Security and Cybersecurity.&lt;/p&gt;
&lt;p id="727f" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;APIs are everywhere and API Security is of the utmost importance for every organization. According to a recent Gartner CIO and Technical Executive survey, Cyber and Information security are at the top of the list for planned investments in 2022.&lt;/p&gt;
&lt;p id="efa6" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;As someone who has spent my entire career in the world of APIs and Internet applications, I have seen first-hand the vulnerabilities that can exist with APIs.&lt;/p&gt;
&lt;p class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;&lt;/p&gt;
&lt;p class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;&lt;strong class="hk ih"&gt;This is part of the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;a class="ck il" href="https://www.youtube.com/watch?v=6LP_3FZDiPU&amp;amp;list=PLKUnjn-fSXRTy8sPPXGrNNBDPVOOi3U49" rel="noopener ugc nofollow" target="_blank"&gt;&lt;strong class="hk ih"&gt;API Cybersecurity 101 series by Senior API Strategist, Brenton House&lt;/strong&gt;&lt;/a&gt;&lt;strong class="hk ih"&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;p class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;&lt;strong class="hk ih"&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;&lt;strong class="hk ih"&gt;&lt;iframe width="425" height="350" src="//www.youtube.com/embed/6LP_3FZDiPU"&gt;&lt;/iframe&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;section class="do dp dq dr ds"&gt;
&lt;div class="n p"&gt;
&lt;div class="ab ac ae af ag dt ai aj"&gt;
&lt;h1 id="666a" class="jh ji dw ce jj jk jl hn jm jn jo hr jp jq jr js jt ju jv jw jx jy jz ka kb kc et" data-selectable-paragraph=""&gt;What is an API?&lt;/h1&gt;
&lt;p id="8291" class="hi hj dw hk b hl kd hn ho hp ke hr hs ht kf hv hw hx kg hz ia ib kh id ie if do et" data-selectable-paragraph=""&gt;The acronym API stands for Application Programming Interface. Basically, it is non-human systems (or applications) that talk to each other in an agreed-upon way! Most often, people are talking about Web APIs, which includes things like REST, GraphQL, gRPC, SOAP, etc. The introduction of smartphones caused an exponential growth and adoption of APIs as pretty much every single mobile application uses APIs.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;
&lt;div class="n p eu im in io" role="separator"&gt;&lt;span class="ip ez gd iq ir is"&gt;&lt;/span&gt;&lt;span class="ip ez gd iq ir is"&gt;&lt;/span&gt;&lt;span class="ip ez gd iq ir"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;section class="do dp dq dr ds"&gt;
&lt;div class="n p"&gt;
&lt;div class="ab ac ae af ag dt ai aj"&gt;
&lt;h1 id="6576" class="jh ji dw ce jj jk jl hn jm jn jo hr jp jq jr js jt ju jv jw jx jy jz ka kb kc et" data-selectable-paragraph=""&gt;What is API Security?&lt;/h1&gt;
&lt;p id="6a45" class="hi hj dw hk b hl kd hn ho hp ke hr hs ht kf hv hw hx kg hz ia ib kh id ie if do et" data-selectable-paragraph=""&gt;The simple answer is that it is about applying and managing security for your APIs but we all know, there is nothing simple about API Security.&lt;/p&gt;
&lt;figure class="it iu iv iw ix iy da db paragraph-image"&gt;
&lt;div class="da db ki"&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/war-games-3.jpg" alt="" width="512" height="243" /&gt;&lt;/div&gt;
&lt;/figure&gt;
&lt;p id="7e36" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;In 1983, there was a movie called&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a class="ck il" href="https://www.imdb.com/title/tt0086567/" rel="noopener ugc nofollow" target="_blank"&gt;&lt;strong class="hk ih"&gt;War Games&lt;/strong&gt;&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;that was released to theaters. You may have never heard of the movie but it was about a boy, David, played by Matthew Broderick, who hacks into NORAD&amp;rsquo;s Military Computer System and accidentally ALMOST starts World War III. The movie got the attention of the most powerful man in the world, at that time.&lt;/p&gt;
&lt;p class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/ronald-reagan-cybersecurity-1.jpeg" alt="" width="780" height="520" /&gt;&lt;/p&gt;
&lt;figure class="it iu iv iw ix iy da db paragraph-image"&gt;
&lt;div role="button" class="km kn ja ko aj kp" tabindex="0"&gt;
&lt;div class="da db kl"&gt;
&lt;div class="iz s ja kv"&gt;
&lt;div class="kw jc s"&gt;
&lt;div class="kq kr t u v ks aj bk kt ku"&gt;According to journalist Fred Kaplan, After seeing a special screening of the movie &amp;ldquo;War Games&amp;rdquo;, then-President Ronald Reagan asked the U.S. Military Joint Chief of Staff if something like this could really happen. He asked, &amp;ldquo;Could someone just break into our most sensitive computers?&amp;rdquo; A week later, the General response was:&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;
&lt;blockquote class="la"&gt;
&lt;p id="15b0" class="lb lc dw dx b ld le lf lg lh li if gu" data-selectable-paragraph=""&gt;&amp;ldquo;The problem is much worse than you think.&amp;rdquo;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p id="264e" class="hi hj dw hk b hl lj hn ho hp lk hr hs ht ll hv hw hx lm hz ia ib ln id ie if do et" data-selectable-paragraph=""&gt;From that moment on, U.S. Cybersecurity and Defense policy would never be the same.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;
&lt;div class="n p eu im in io" role="separator"&gt;&lt;span class="ip ez gd iq ir is"&gt;&lt;/span&gt;&lt;span class="ip ez gd iq ir is"&gt;&lt;/span&gt;&lt;span class="ip ez gd iq ir"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;section class="do dp dq dr ds"&gt;
&lt;div class="n p"&gt;
&lt;div class="ab ac ae af ag dt ai aj"&gt;
&lt;p id="0db0" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;Fast forward almost 40 years and everyone with a smartphone has a computer more powerful than any supercomputer that existed at that time. YouTube is now full of free videos and training on how to code and become a serious developer (or a hacker). What that means is that almost anyone, from anywhere, in any country, could be trying to get into your APIs and systems TODAY. Everyone needs to be educated and prepared to defend against API attacks; malicious or not.&lt;/p&gt;
&lt;p id="e234" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;What most don&amp;rsquo;t understand is that API security starts with&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong class="hk ih"&gt;humans, not computers.&lt;/strong&gt;&lt;/p&gt;
&lt;figure class="it iu iv iw ix iy da db paragraph-image"&gt;
&lt;div role="button" class="km kn ja ko aj kp" tabindex="0"&gt;
&lt;div class="da db lo"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;
&lt;p id="10ca" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;If someone puts their password on a sticky note attached to their monitor, it doesn&amp;rsquo;t matter how many security checks you do, how much security code you have in place, or what different security products you have installed.&lt;/p&gt;
&lt;p id="01e4" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;There are, however, a lot of things that you can do to protect yourself and minimize damage from this and other forms of social hacking. We will be covering this in upcoming articles of our API Cybersecurity series.&lt;/p&gt;
&lt;p class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;&lt;/p&gt;
&lt;section class="do dp dq dr ds"&gt;
&lt;div class="n p"&gt;
&lt;div class="ab ac ae af ag dt ai aj"&gt;
&lt;h1 id="0b09" class="jh ji dw ce jj jk jl hn jm jn jo hr jp jq jr js jt ju jv jw jx jy jz ka kb kc et" data-selectable-paragraph=""&gt;OWASP Top 10 List for API Security&lt;/h1&gt;
&lt;p id="07ce" class="hi hj dw hk b hl kd hn ho hp ke hr hs ht kf hv hw hx kg hz ia ib kh id ie if do et" data-selectable-paragraph=""&gt;One thing you might have heard of and need to pay attention to is OWASP.&lt;/p&gt;
&lt;p id="9b33" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;&lt;a class="ck il" href="https://owasp.org/" rel="noopener ugc nofollow" target="_blank"&gt;OWASP&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is the Open Web Application Security Project.&lt;/p&gt;
&lt;p id="750f" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;It&amp;rsquo;s an international non-profit organization dedicated to web application security.&lt;/p&gt;
&lt;p id="6d77" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;What they are probably most well-known for is their re-occurring&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a class="ck il" href="https://owasp.org/www-project-top-ten/" rel="noopener ugc nofollow" target="_blank"&gt;Top 10 list of Web Vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;p id="fbf7" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;But in addition to their lists of web vulnerabilities, they also came out with a&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a class="ck il" href="https://owasp.org/www-project-api-security/" rel="noopener ugc nofollow" target="_blank"&gt;Top 10 list for API Security&lt;/a&gt;. Now it is a few years old but all of these are still important factors to consider with your API Security.&lt;/p&gt;
&lt;p id="8433" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;The latest OWASP API Security Top 10 list includes:&lt;/p&gt;
&lt;ul class=""&gt;
&lt;li id="f94c" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if lp lq lr et" data-selectable-paragraph=""&gt;API1:2019 Broken Object Level Authorization&lt;/li&gt;
&lt;li id="1b37" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API2:2019 Broken User Authentication&lt;/li&gt;
&lt;li id="3adb" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API3:2019 Excessive Data Exposure&lt;/li&gt;
&lt;li id="7037" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API4:2019 Lack of Resources &amp;amp; Rate Limiting&lt;/li&gt;
&lt;li id="b7f7" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API5:2019 Broken Function Level Authorization&lt;/li&gt;
&lt;li id="2b5f" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API6:2019 Mass Assignment&lt;/li&gt;
&lt;li id="061b" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API7:2019 Security Misconfiguration&lt;/li&gt;
&lt;li id="8fba" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API8:2019 Injection&lt;/li&gt;
&lt;li id="0c68" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API9:2019 Improper Assets Management&lt;/li&gt;
&lt;li id="5c2a" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API10:2019 Insufficient Logging &amp;amp; Monitoring&lt;/li&gt;
&lt;/ul&gt;
&lt;p id="14aa" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;Inside these topics, you are going to discover even more details that you need to be familiar with and understand.&lt;/p&gt;
&lt;ul class=""&gt;
&lt;li id="3248" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if lp lq lr et" data-selectable-paragraph=""&gt;API Keys&lt;/li&gt;
&lt;li id="6aa7" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API Logging&lt;/li&gt;
&lt;li id="2360" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API Injections&lt;/li&gt;
&lt;li id="eb69" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API Hackers&lt;/li&gt;
&lt;li id="29a3" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;Zero Trust APIs&lt;/li&gt;
&lt;li id="2af2" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;Shadow APIs&lt;/li&gt;
&lt;li id="72b4" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API Access Control&lt;/li&gt;
&lt;li id="6b88" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API Security Testing&lt;/li&gt;
&lt;li id="97f2" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;JWTs&lt;/li&gt;
&lt;li id="f2b1" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;OAuth and OpenID Connect&lt;/li&gt;
&lt;li id="9a9f" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;Identity and Access Management&lt;/li&gt;
&lt;li id="1e61" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;Multi-Factor Authentication&lt;/li&gt;
&lt;li id="cc62" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API Observation&lt;/li&gt;
&lt;li id="0a8b" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;API Threat Detection&lt;/li&gt;
&lt;li id="d405" class="hi hj dw hk b hl ls hn ho hp lt hr hs ht lu hv hw hx lv hz ia ib lw id ie if lp lq lr et" data-selectable-paragraph=""&gt;And more&amp;hellip;&lt;/li&gt;
&lt;/ul&gt;
&lt;p id="0c15" class="hi hj dw hk b hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if do et" data-selectable-paragraph=""&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;
&lt;h1&gt;&lt;a href="https://brenton.house/what-is-api-security-5ca8117d4911" target="_blank"&gt;Read the complete article on API Security and API Cybersecurity 101 here!&lt;/a&gt;&lt;/h1&gt;
</description><pubDate>Mon, 20 Dec 2021 21:56:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-security-101-cyber-security-explained</guid><category>api</category><category>api security</category><category>api strategy</category><category>api management</category><category>brenton house</category><category>houserules</category></item><item><title>API Trends 2022 - API Security and Cybersecurity</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-security-and-cybersecurity</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-01-api-security-cybersecurity.png" alt="API Trends 2022 - API Security and Cybersecurity - Brenton House" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Security%20and%20Cybersecurity-,API%20Cybersecurity,-At%20number%201"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Security%20and%20Cybersecurity-,API%20Cybersecurity,-At%20number%201&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p id="02b1" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;As long as there have been APIs, there have been hackers who are searching for vulnerabilities in those APIs. API Security and Cybersecurity is of critical importance for EVERY organization. Especially now. NOBODY wants to be in the headlines for all the wrong reasons.&lt;/p&gt;
&lt;p id="bc8e" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Earlier, Gartner had predicted that by 2022, API abuses will move from infrequent to the most-frequent attack vector. The growth in not only the number of APIs but the exponential increase in API usage has made this prediction all the more impactful on businesses around the world.&lt;/p&gt;
&lt;p id="5741" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;According to a more recent Gartner CIO and Technical Executive survey, cyber and information security are at the top of the list for planned investments in 2022. This is not surprising as business leaders are feeling the pressure to put budget and resources behind cybersecurity to protect their APIs, data, customers, and the reputation of their companies.&lt;/p&gt;
&lt;p id="e0a4" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;You may have heard the phrase &amp;ldquo;&lt;strong class="hs lb"&gt;Shift Left, Shield Right&lt;/strong&gt;&amp;rdquo;.&lt;/p&gt;
&lt;p id="3a82" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;&lt;code class="ll lm ln lo lp b"&gt;&lt;strong class="hs lb"&gt;&amp;ldquo;Shift Left&lt;/strong&gt;&lt;/code&gt;" is referring to is shifting your security focus to the beginning of the API Lifecycle process and to integrate it into the design, development, and every other step of the API Lifecycle all the way to the retirement of an API.&lt;/p&gt;
&lt;p id="39fe" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;&lt;code class="ll lm ln lo lp b"&gt;&lt;strong class="hs lb"&gt;&amp;ldquo;Shield Right&lt;/strong&gt;&lt;/code&gt;" is talking about the emphasis on continuing to protect your APIs at runtime and beyond. Doing this will allow you to provide a defense against unknown attacks.&lt;/p&gt;
&lt;p id="c342" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Closely related to API Cybersecurity is the topic of encryption and privacy. Because of the close relation to security, they are included in this topic. Organizations are increasing their understanding and proper implementation of encryption to protect their data. Everything from storage and transmission of data requires a critical security eye when planning and implementing DevOps security. Privacy is also directly related to this as API Cybersecurity is an essential key to securing the privacy of users and employees. Not only does data need to be secured but sometimes the best decision is not to store the data at all. There are a lot of government regulations surrounding privacy in certain parts of the world but security and privacy requirements can also drive a strategy that reduces unnecessary data to protect both consumers and enterprises alike.&lt;/p&gt;
&lt;p id="04b7" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;API Cybersecurity as it is important for everyone to understand API Cybersecurity, what is at risk, and how to protect and defend your APIs and other systems from attacks.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Security%20and%20Cybersecurity-,API%20Cybersecurity,-At%20number%201"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Security%20and%20Cybersecurity-,API%20Cybersecurity,-At%20number%201&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 18:00:13 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-security-and-cybersecurity</guid><category>apis</category><category>api security</category><category>api management</category><category>cybersecurity</category><category>api first</category><category>api strategy</category><category>brenton house</category><category>houserules</category></item><item><title>API Trends 2022 - Seamless Integration Solutions</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-seamless-integration-solutions</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-02-seamless-integration-solutions.png" alt="API Trends 2022 - Seamless Integration Solutions - Brenton House" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Seamless%20Integration%20Solutions-,Seamless%20Integration%20Solutions,-At%20number%202"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Seamless%20Integration%20Solutions-,Seamless%20Integration%20Solutions,-At%20number%202&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p id="b615" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;An API without any integrations is like a car without fuel or power. It&amp;rsquo;s may look pretty but it is not very functional.&lt;/p&gt;
&lt;p id="5261" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Not only do APIs need to accept integrations and integrate with other APIs but there can also be complex requirements for chaining and transforming the incoming and outgoing data across these integrations.&lt;/p&gt;
&lt;p id="fde4" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;APIs need to be able to easily integrate with anything, anywhere. 2022 will see the need for seamless API integrations that grow and scale even further with solid and proven integration tools standing out from the crowd because of their smooth and seamless handling of integration processes, both on-premise and in the cloud. Because of this increased demand for secure integrations with other APIs and systems, organizations want and need products that can remove the friction from their integration experience.&lt;/p&gt;
&lt;p class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Seamless%20Integration%20Solutions-,Seamless%20Integration%20Solutions,-At%20number%202"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Seamless%20Integration%20Solutions-,Seamless%20Integration%20Solutions,-At%20number%202&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 17:58:26 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-seamless-integration-solutions</guid><category>apis</category><category>api integration</category><category>api strategy</category><category>api management</category><category>api first</category><category>brenton house</category><category>houserules</category><category>api security</category></item><item><title>API Trends 2022 - Adaptive API Management</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-adaptive-api-management</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-03-adaptive-api-management.png" alt="API Trends 2022 - Adaptive API Management" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Adaptive%20API%20Management-,Adaptive%20API%20Management,-At%20number%203"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Adaptive%20API%20Management-,Adaptive%20API%20Management,-At%20number%203&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p id="38bc" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Managing the entire API Lifecycle can be challenging. Every organization is different and often the needs and requirements can be quite complex. Enterprises need to adapt quickly to changes in the market, changes in government regulations, changes in technology, and even changes in how (and where) people work.&lt;/p&gt;
&lt;p id="a1c3" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;New APIs are created every day and people need API Management that can adapt as well. Whether you are adapting to new API policy requirements, new API security threats, new API integration requirements, or new API consumer or partner opportunities, the need for an Adaptive API Management system is growing every day.&lt;/p&gt;
&lt;p id="6b39" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Because of issues like these, 2022 will see the continued growth of Adaptive API Management systems like webMethods which provides a robust and holistic approach to API Management. Some organizations need on-prem solutions. Others want to use cloud-based SaaS solutions. But a growing number will need something in-between with a mix of both.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Adaptive%20API%20Management-,Adaptive%20API%20Management,-At%20number%203"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Adaptive%20API%20Management-,Adaptive%20API%20Management,-At%20number%203&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 17:56:20 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-adaptive-api-management</guid><category>apis</category><category>api management</category><category>adaptive api management</category><category>brenton house</category><category>houserules</category><category>api strategy</category><category>api security</category><category>api trends</category><category>api first</category></item><item><title>API Trends 2022 - API Integration Automation</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-integration-automation</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-04-api-integration-automation.png" alt="API Trends - API Integration Automation" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=and%20Integration%20Automation-,API%20and%20Integration%20Automation,-At%20number%204"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=and%20Integration%20Automation-,API%20and%20Integration%20Automation,-At%20number%204&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p id="9cc7" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;This goes beyond some of the automation that we have seen in previous years:&lt;/p&gt;
&lt;ul class=""&gt;
&lt;li id="5ae7" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in lc ld le cr" data-selectable-paragraph=""&gt;Automated API integration tests&lt;/li&gt;
&lt;li id="763a" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Automated code unit tests&lt;/li&gt;
&lt;li id="39b5" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Automated publishing&lt;/li&gt;
&lt;li id="4900" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Automated security checks.&lt;/li&gt;
&lt;/ul&gt;
&lt;p id="1aa2" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;GitHub has recently announced a new development tool called&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a class="cd lk" href="https://copilot.github.com/" rel="noopener ugc nofollow" target="_blank"&gt;GitHub CoPilot&lt;/a&gt;. GitHub Copilot is an artificial intelligence tool developed by GitHub and OpenAI to assist users by auto-completing code. Now there has been a lot of feedback on this (both good and bad) but the point is things are changing. The goal of automation is not to replace workers but to allow workers to focus on more important tasks.&lt;/p&gt;
&lt;p id="b64d" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Keep an eye out for an increase in:&lt;/p&gt;
&lt;ul class=""&gt;
&lt;li id="0ba5" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in lc ld le cr" data-selectable-paragraph=""&gt;Automation for API design with various no-code solutions&lt;/li&gt;
&lt;li id="0672" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Automation with API Integrations&lt;/li&gt;
&lt;li id="fc56" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Automation in API creation&lt;/li&gt;
&lt;li id="0db3" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Automation for API Management and Governance&lt;/li&gt;
&lt;li id="0383" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Advancements in automation for API Security&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=and%20Integration%20Automation-,API%20and%20Integration%20Automation,-At%20number%204"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=and%20Integration%20Automation-,API%20and%20Integration%20Automation,-At%20number%204&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 17:53:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-integration-automation</guid><category>apis</category><category>api strategy</category><category>api automation</category><category>automation</category><category>api first</category><category>api management</category><category>api integration</category></item><item><title>API Trends 2022 - Industry Specific Breakouts</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-industry-specific-breakoiuts</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-05-industry-specific-breakouts.png" alt="API Trends 2022 - Industry Specific Breakouts - Brenton House" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Industry%2DSpecific%20Breakouts"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Industry%2DSpecific%20Breakouts&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p id="1d88" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Take&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a class="cd lk" href="https://blog.softwareag.com/open-banking-apis" rel="noopener ugc nofollow" target="_blank"&gt;Open Banking&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as an easy example of this. If you are in the financial industry (especially if you are in a geographical region that has government regulations around this), you have been aware of the changes both in standards and government regulations that have shaped how financial and banking APIs integrate with one another.&lt;/p&gt;
&lt;p id="5dc0" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;The healthcare industry is also seeing similar growth with the development and implementation of&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a class="cd lk" href="https://fhir.org/" rel="noopener ugc nofollow" target="_blank"&gt;FHIR (Fast Healthcare Interoperability Resources)&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;and other healthcare standards.&lt;/p&gt;
&lt;p id="16de" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Expect to see a continuation of growth in some of these existing verticals as well as spikes and new growth in other industries.&lt;/p&gt;
&lt;p id="4f75" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Keep a watchful eye on Government, Manufacturing, Transportation/Logistics, Retail, Insurance, Supply chain, Telecom, and some others.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Industry%2DSpecific%20Breakouts"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Industry%2DSpecific%20Breakouts&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 16:49:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-industry-specific-breakoiuts</guid><category>apis</category><category>api strategy</category><category>api management</category><category>open banking</category><category>fhir apis</category><category>brenton house</category><category>houserules</category><category>healthcare apis</category><category>api first</category></item><item><title>API Trends 2022 - API Best Practices</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-best-practices</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-06-api-best-practices.png" alt="API Trends 2022 - API Best Practices - Brenton House" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%20Best%20Practices-,API%20Best%20Practices,-Closely%20related%20to"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%20Best%20Practices-,API%20Best%20Practices,-Closely%20related%20to&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p id="e795" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;While there have always been Best Practices of some sort around the use of APIs, Integrations, and Microservices, it has been kind of hit-and-miss with what you could find and where you might find it. Often best practices might have conflicting messages or be so vague as to lead to branches of differing micro best practices.&lt;/p&gt;
&lt;p id="b52c" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Although RESTful APIs are solidifying their position as the current standard for APIs, we are also seeing an increase in the use of GraphQL, gRPC, and others. This has driven an increased need for formalized Best Practices around, not only covering what technology and standards to use, but how to do it in the best possible way so as to reduce the amount of future rework involved.&lt;/p&gt;
&lt;p id="43fe" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Best Practices include many API topics including (but not limited to):&lt;/p&gt;
&lt;ul class=""&gt;
&lt;li id="0ed5" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in lc ld le cr" data-selectable-paragraph=""&gt;&lt;a class="cd lk" href="https://blog.softwareag.com/api-developer-portal" rel="noopener ugc nofollow" target="_blank"&gt;API Design&lt;/a&gt;&lt;/li&gt;
&lt;li id="d730" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;&lt;a class="cd lk" href="https://blog.softwareag.com/api-security-explained" rel="noopener ugc nofollow" target="_blank"&gt;API Security&lt;/a&gt;&lt;/li&gt;
&lt;li id="58dc" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;&lt;a class="cd lk" href="https://www.softwareag.com/en_corporate/platform/integration-apis.html" rel="noopener ugc nofollow" target="_blank"&gt;API Integrations&lt;/a&gt;&lt;/li&gt;
&lt;li id="82f8" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;API Transformations&lt;/li&gt;
&lt;li id="d4a6" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Logging and Tracing&lt;/li&gt;
&lt;li id="b8d0" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Code and Design Linting&lt;/li&gt;
&lt;li id="521f" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Error Handling&lt;/li&gt;
&lt;li id="069b" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Monetization&lt;/li&gt;
&lt;li id="620c" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Onboarding&lt;/li&gt;
&lt;li id="ddbc" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Versioning&lt;/li&gt;
&lt;li id="f22c" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Observation&lt;/li&gt;
&lt;li id="d561" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Analytics&lt;/li&gt;
&lt;li id="fc9c" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Documentation&lt;/li&gt;
&lt;li id="6460" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Testing / Audits&lt;/li&gt;
&lt;li id="7ed6" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Pagination / Bulk Data Handling&lt;/li&gt;
&lt;li id="b7ae" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Eventing &amp;mdash; WebHooks / Polling / Web Sockets&lt;/li&gt;
&lt;li id="07ea" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Scalability&lt;/li&gt;
&lt;li id="73b5" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;And many more!&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%20Best%20Practices-,API%20Best%20Practices,-Closely%20related%20to"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%20Best%20Practices-,API%20Best%20Practices,-Closely%20related%20to&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 16:46:28 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-best-practices</guid><category>api best practices</category><category>apis</category><category>api security</category><category>api strategy</category><category>api first</category><category>api integrations</category></item><item><title>API Trends 2022 - Open API Standards</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-open-api-standards</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-07-open-api-standards.png" alt="API Trends 2022- Open API Standards - Brenton House" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Open%20API%20Standards-,Open%20API%20Standards,-At%20number%207"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Open%20API%20Standards-,Open%20API%20Standards,-At%20number%207&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p id="9e0e" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;With the advancement of tools, technology, code, and no-code solutions, it&amp;rsquo;s actually not that difficult to build an API these days. However, building APIs that are extensible, scalable, actually use best practices, and properly implement open standards can be a much more difficult feat.&lt;/p&gt;
&lt;p id="0edc" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;RESTful APIs and open standards such as SOAP, Swagger, OpenAPI, JSON Schema, AsyncAPI, and GraphQL have been around for a while but we are seeing substantial growth in the community around the development of these standards and the participation from businesses and individuals in keeping these standards up-to-date with new features and improved documentation.&lt;/p&gt;
&lt;p id="2f02" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;My recommendation would be to get involved with the groups that support these standards and participate in the process of growing the API community. If you are consuming and using these standards, (and I am sure you are), keep up-to-date with the changes to ensure you are producing and integrating with APIs in the best possible (and securest) way.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Open%20API%20Standards-,Open%20API%20Standards,-At%20number%207"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=Open%20API%20Standards-,Open%20API%20Standards,-At%20number%207&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 16:43:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-open-api-standards</guid><category>api</category><category>openapi</category><category>swagger</category><category>api standards</category><category>api strategy</category><category>api security</category><category>json schema</category><category>graphql</category></item><item><title>API Trends 2022 - API Integration Experience</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-integration-experience</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-08-api-integration-experience.png" alt="API Trends 2022 - API Integration Experience - Brenton House" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=and%20Integration%20Experience-,API%20and%20Integration%20Experience,-Coming%20in%20at"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=and%20Integration%20Experience-,API%20and%20Integration%20Experience,-Coming%20in%20at&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p id="4255" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;Everyone wants the experience with their API products to be magical. From APIs, API Documentation, API Developer Portals, and API Artifacts, a lot can be said about the user and developer experience across the entire API landscape.&lt;/p&gt;
&lt;p id="1925" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;The reason API Experience is on the Top 10 list is that along with the huge growth of APIs in the past few years, there has been a corresponding growth in expectations that users and developers have when they go to consume or integrate with an API product.&lt;/p&gt;
&lt;p id="0a0c" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;API Products and Portfolios need to include things like:&lt;/p&gt;
&lt;ul class=""&gt;
&lt;li id="7413" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in lc ld le cr" data-selectable-paragraph=""&gt;Being intuitive (a must-have!)&lt;/li&gt;
&lt;li id="cc26" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Well-documented APIs&lt;/li&gt;
&lt;li id="1193" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Self-Service Developer Portal&lt;/li&gt;
&lt;li id="a2a4" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Having a great onboarding experience (zero to API in 5 minutes)&lt;/li&gt;
&lt;li id="253b" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Consistent and useful error messaging&lt;/li&gt;
&lt;li id="16f9" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Keep it simple (it has one job)&lt;/li&gt;
&lt;li id="9dbb" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Don&amp;rsquo;t be ugly (great UX and aesthetics)&lt;/li&gt;
&lt;li id="2426" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Providing great logging and analytics&lt;/li&gt;
&lt;li id="e23c" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Including code samples and Postman scripts&lt;/li&gt;
&lt;li id="1b0b" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Free-forever developer tier&lt;/li&gt;
&lt;/ul&gt;
&lt;p id="329c" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;A great developer and user experience for your APIs and integrations can give you an edge up over your competition and make a world of difference as to whether your digital and non-digital products are successful in this competitive market.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=and%20Integration%20Experience-,API%20and%20Integration%20Experience,-Coming%20in%20at"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=and%20Integration%20Experience-,API%20and%20Integration%20Experience,-Coming%20in%20at&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 16:41:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-integration-experience</guid><category>api</category><category>api trends</category><category>api strategy</category><category>api experience</category><category>api security</category><category>api first</category></item><item><title>API Trends 2022 - API-Led Modernization</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-led-modernization</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-09-api-led-modernization.png" alt="API Trends 2022 - API-Led Modernization - Brenton House" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%2DLed%20Modernization-,API%2DLed%20Modernization,-At%20number%209"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%2DLed%20Modernization-,API%2DLed%20Modernization,-At%20number%209&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Mainframe and legacy systems can be a big dependency (and liability) for many organizations. We are seeing an increase in the number of companies that are using APIs and API Platforms to replace and extend the capabilities of their legacy systems.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%2DLed%20Modernization-,API%2DLed%20Modernization,-At%20number%209"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%2DLed%20Modernization-,API%2DLed%20Modernization,-At%20number%209&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 16:35:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-led-modernization</guid><category>api</category><category>api trends</category><category>api strategy</category><category>api first</category><category>api security</category><category>api integration</category></item><item><title>API Trends 2022 - API Economy Growth</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-economy-growth</link><description>&lt;p&gt;&lt;img src="https://cdn.secure-api.org/api-shorts/images/api-trends-2022-10-api-economy-growth.png" alt="API trends 2022 with Brenton House - 10 - api economy growth" width="1000" height="563" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%20Economy%20Growth-,API%20Economy%20Growth,-At%20number%2010"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%20Economy%20Growth-,API%20Economy%20Growth,-At%20number%2010&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p id="d7a6" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;The API Economy is taking the world by storm. When talking about the API Economy, we are not just referencing your ability to sell access to your APIs and data.&lt;/p&gt;
&lt;p id="ab23" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;No, it&amp;rsquo;s much more than this. It&amp;rsquo;s about:&lt;/p&gt;
&lt;ul class=""&gt;
&lt;li id="169f" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in lc ld le cr" data-selectable-paragraph=""&gt;Revolutionizing how enterprises are organizing their teams, resources, and budgets.&lt;/li&gt;
&lt;li id="8e75" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;The entire supply chain being powered by APIs&lt;/li&gt;
&lt;li id="507b" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Ordering dinner and having it delivered to your home.&lt;/li&gt;
&lt;li id="70b3" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Providing a way to request an Uber ride and track it from beginning to end&lt;/li&gt;
&lt;li id="54d5" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Streaming movies and television shows to televisions, computers, and mobile phones around the world&lt;/li&gt;
&lt;li id="b180" class="hq hr fo hs b ht lf hv hw hx lg hz ia ib lh id ie if li ih ii ij lj il im in lc ld le cr" data-selectable-paragraph=""&gt;Ordering fresh groceries and having them delivered from store to front porch&lt;/li&gt;
&lt;/ul&gt;
&lt;p id="a612" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;APIs on their own are not enough to drive this digital ecosystem. APIs are simply the enablers for and the gateway to the digital and physical products that you are already creating or plan on creating. APIs are what enable businesses to engage with consumers in the digital world. APIs are how your products are going to be viewed, purchased, consumed, and judged in this digital economy.&lt;/p&gt;
&lt;p id="f11a" class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;In order to compete in this very competitive API market, companies are adopting API First strategies. They are realizing that their APIs are a Product, and not an add-on to their existing products. These decisions to put budget and resources behind their API teams will allow them to succeed and win in 2022.&lt;/p&gt;
&lt;p class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;&lt;/p&gt;
&lt;p class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;&lt;a href="https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%20Economy%20Growth-,API%20Economy%20Growth,-At%20number%2010"&gt;https://brenton.house/top-10-api-integration-trends-for-2022-49b05f2ef299#:~:text=API%20Economy%20Growth-,API%20Economy%20Growth,-At%20number%2010&lt;/a&gt;&lt;/p&gt;
&lt;p class="hq hr fo hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in fg cr" data-selectable-paragraph=""&gt;&lt;/p&gt;
</description><pubDate>Mon, 20 Dec 2021 16:30:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/api-trends-2022-api-economy-growth</guid><category>api</category><category>api management</category><category>api strategy</category><category>api first</category><category>api economy</category><category>api security</category></item><item><title>Brenton House - Give your App and APIs a Turbo Boost – Part 2</title><link>https://weblogs.asp.net:443/bhouse/brenton-house-give-your-app-and-apis-a-turbo-boost-part-2</link><description>&lt;p&gt;&lt;em&gt; &lt;img width="572" height="320" alt="" src="https://aspblogs.blob.core.windows.net:443/media/bhouse/Media/blog-572x320_TitaniumBoost-1.jpg" /&gt; &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Brenton House talks about Exploring the power and extensibility of&amp;nbsp;APIs for Mobile&amp;nbsp;- Development and Architecture&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/give-your-titanium-app-a-turbo-boost-part-1-9b949d92a7e"&gt;In Part 1 of this series on Mobile Architecture and Development&lt;/a&gt;, we talked about the different ways you can use and extend the&amp;nbsp;mobile platforms for building cross-platform native mobile apps. Today, we dig in with a detailed example of how extend the power of Titanium Alloy, the MVC framework created to make building with Titanium even easier.&lt;/p&gt;
&lt;p&gt;When we ended up last time, we saw that we could install a local version of Alloy to build a mobile app. To fully demonstrate the power of this seemingly simple step, I&amp;rsquo;ve created the open-source framework and published it on GitHub here:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://github.com/brentonhouse/titanium-turbo" target="_blank" rel="noopener noreferrer"&gt;https://github.com/brentonhouse/titanium-turbo&lt;/a&gt;. I&amp;rsquo;ve called it &amp;ldquo;&lt;strong&gt;&lt;code&gt;Turbo&lt;/code&gt;&lt;/strong&gt;&amp;rdquo; to go along with the theme of this series, and I&amp;rsquo;ll walk you through what I&amp;rsquo;ve done and demonstrate the power of Turbo.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://brenton.house/give-your-titanium-app-a-turbo-boost-part-2-11a9be7ce019"&gt;Read rest of post here on&amp;nbsp;Brenton House - Master API Chef and Strategist&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</description><pubDate>Sun, 20 Oct 2019 17:07:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house-give-your-app-and-apis-a-turbo-boost-part-2</guid><category>brenton house</category><category>api</category><category>mobile api</category><category>api management</category><category>titanium turbo</category><category>titanium native</category><category>mobile</category></item><item><title>Easily Enable Speech Recognition in Titanium iOS using Hyperloop</title><link>https://weblogs.asp.net:443/bhouse/brenton-house/easily-enable-speech-recognition-in-titanium-ios-using-hyperloop</link><description>&lt;p&gt;&lt;span&gt;&lt;img src="https://brentonhouse.files.wordpress.com/2017/04/brenton-house-mobile-architect-voice-recognition.jpg?w=544" alt="brenton-house-mobile-architect-voice-recognition" width="544" height="363" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Speech recognition in products is already big and it is growing fast. From Siri, Alexa, Google Now, Cortana, and others comes the ability for apps and devices to be able to assist users in a multitude of creative ways. While hands-free control using voice has gathered most of the attention, the introduction of new APIs has also opened the door for developers to use these mature speech recognition features within apps as well.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Appcelerator Titanium already creates iOS and Android native applications but using Hyperloop, developers now have access to even more native capabilities than before! &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.appcelerator.com/blog/2017/04/real-time-speech-recognition-in-ios-10-using-hyperloop/" target="_blank" title="Brenton House demonstrates how to use iOS speech recognition"&gt;Read more on how to easily implement real-time speech recognition for Titanium native iOS apps&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Brenton House is a Senior Mobile Architect with over 20 years experience in mobile, API, and web development. He has worked with many clients across various industries, including broadcasting, advertising, retail, financial services, transportation, and publishing. His passion for everything mobile together with his mobile strategy and design experience, drive him to create products that inspire and captivate audiences.&lt;/p&gt;
</description><pubDate>Wed, 19 Apr 2017 15:48:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/brenton-house/easily-enable-speech-recognition-in-titanium-ios-using-hyperloop</guid><category>brenton house</category><category>titanium native</category><category>appcelerator</category><category>hyperloop</category><category>native</category><category>mobile</category><category>ios</category><category>android</category><category>voice</category><category>speech</category></item><item><title>Error creating new MVC Controller for Entity Framework</title><link>https://weblogs.asp.net:443/bhouse/error-creating-new-mvc-controller-for-entity-framework</link><description>&lt;p&gt;I downloaded and installed Visual Studio 11 (2012) RC today but I am getting an error every time I try to add a MVC controller to a project.&amp;#160; &lt;/p&gt;  &lt;p&gt;Unable to retrieve metadata for 'MyNamespace.TestEntity. Unable to load one or more of the requested types. Retrieve the LoaderExceptions property for more information.&lt;/p&gt;  &lt;p&gt;I know this bug existed in Visual Studio 11 Beta but it is marked as fixed in Microsoft Connect.&amp;#160; If anyone has a fix for this, please post!&lt;/p&gt;  &lt;p&gt;&lt;a href="https://aspblogs.blob.core.windows.net/media/bhouse/Media/MVC_Error_3A14BDA1.jpg"&gt;&lt;img style="background-image: none; border-right-width: 0px; margin: 5px 5px 5px 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px" title="MVC_Error" border="0" alt="MVC_Error" src="https://aspblogs.blob.core.windows.net/media/bhouse/Media/MVC_Error_thumb_20ACBA67.jpg" width="690" height="273" /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;You can vote for this bug on Microsoft Connect here:&amp;#160; &lt;/p&gt;  &lt;p&gt;&lt;a href="https://connect.microsoft.com/VisualStudio/feedback/details/745901/error-creating-new-mvc-controller-for-entity-framework"&gt;https://connect.microsoft.com/VisualStudio/feedback/details/745901/error-creating-new-mvc-controller-for-entity-framework&lt;/a&gt;&lt;/p&gt;    &lt;p&gt;&lt;a title="Brenton House" href="http://www.brentonhouse.com" target="_blank"&gt;Brenton House&lt;/a&gt;&lt;/p&gt; &lt;!-- Place this tag where you want the +1 button to render --&gt;&lt;g:plusone href="http://weblogs.asp.net/bhouse/default.aspx" annotation="inline"&gt;&lt;/g:plusone&gt;
</description><pubDate>Fri, 01 Jun 2012 22:18:11 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/error-creating-new-mvc-controller-for-entity-framework</guid></item><item><title>Google introduces the Knowledge Graph</title><link>https://weblogs.asp.net:443/bhouse/google-introduces-the-knowledge-graph</link><description>&lt;p&gt;Google is rolling out a HUGE new feature in the next few days.&amp;#160; They call it the “Knowledge Graph” and it is supposed to be a much smarter system for gathering the search results that you want.&amp;#160; This will set SEO experts scrambling to see how to best optimize sites and content!&lt;/p&gt;  &lt;p&gt;&lt;a href="https://aspblogs.blob.core.windows.net/media/bhouse/Media/mobile-tablet-desktop_62761E49.jpg"&gt;&lt;img style="background-image: none; border-right-width: 0px; margin: 5px 5px 5px 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px" title="mobile-tablet-desktop" border="0" alt="mobile-tablet-desktop" src="https://aspblogs.blob.core.windows.net/media/bhouse/Media/mobile-tablet-desktop_thumb_14018BDF.jpg" width="755" height="523" /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;[via &lt;a href="http://www.google.com/insidesearch/features/search/knowledge.html" target="_blank"&gt;Google&lt;/a&gt;]&lt;/p&gt;  &lt;h3&gt;Introducing the Knowledge Graph&lt;/h3&gt;  &lt;p&gt;When you search, you’re not just looking for a webpage. You’re looking to get answers, understand concepts and explore.&lt;/p&gt;  &lt;p&gt;The next frontier in search is to understand real-world things and the relationships among them. So we're building a &lt;b&gt;Knowledge Graph:&lt;/b&gt; a huge collection of the people, places and things in the world and how they're connected to one another.&lt;/p&gt;  &lt;p&gt;This is how we’ll be able to tell if your search for “mercury” refers to the planet or the chemical element--and also how we can get you smarter answers to jump start your discovery.&lt;/p&gt;  &lt;h4&gt;See it in action&lt;/h4&gt; When you search for things, people, or places that Google knows about, we can use the Knowledge Graph to enhance your search results.   &lt;p&gt;&lt;b&gt;Find the right thing&lt;/b&gt;     &lt;br /&gt;The words you search with can often have more than one meaning. With the Knowledge Graph we can understand the difference, and help you narrow your results to find just the answers you're looking for.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Get the best summary&lt;/b&gt;     &lt;br /&gt;See key facts about your search with the most useful and interesting information for that particular topic, based on the questions other people have asked.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Go deeper and broader&lt;/b&gt;     &lt;br /&gt;Make unexpected discoveries and explore a topic more deeply with a springboard of information at your fingertips. What you find may surprise you!&lt;/p&gt;  &lt;p&gt;See where your curiosity will take you. &lt;a href="https://www.google.com/search?q=vincent+van+gogh" target="_blank"&gt;Give it a try.&lt;/a&gt;&lt;/p&gt;    &lt;p&gt;&lt;a title="Brenton House" href="http://www.brentonhouse.com" target="_blank"&gt;Brenton House&lt;/a&gt;&lt;/p&gt; &lt;!-- Place this tag where you want the +1 button to render --&gt;&lt;g:plusone href="http://weblogs.asp.net/bhouse/default.aspx" annotation="inline"&gt;&lt;/g:plusone&gt;
</description><pubDate>Wed, 16 May 2012 19:32:52 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/google-introduces-the-knowledge-graph</guid><category>Brenton House</category><category>Community News</category><category>Google</category></item><item><title>Basic WCF Authentication with SQL Membership Provider</title><link>https://weblogs.asp.net:443/bhouse/basic-wcf-authentication-with-sql-membership-provider</link><description>&lt;p&gt;&lt;plusone href="http://weblogs.asp.net/bhouse/default.aspx" annotation="inline"&gt;&lt;/plusone&gt;There is an interesting article on Code Project about using WCF Basic Authentication with SQL Membership Provider.&amp;#160;&amp;#160; Obviously, there are much more sophisticated ways of securing WCF services but it is an interesting how-to for getting basic security for WCF up and running.&lt;/p&gt;  &lt;h3&gt;&lt;font style="font-weight: normal"&gt;&lt;a href="http://www.codeproject.com/Articles/379636/WCF-Basic-Authentication-with-SQL-Membership-Provi" target="_blank"&gt;&lt;font style="font-weight: normal"&gt;WCF Basic Authentication with SQL Membership Provider&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/h3&gt;  &lt;blockquote&gt;   &lt;p&gt;We will show you how to set up WCF Basic Authentication using the SQL Membership Provider provided by Microsoft.It is highly recommended that you walk through the explanations by looking at the &lt;a href="http://www.dotnetlead.com/" target="_blank"&gt;source code&lt;/a&gt;&lt;b&gt;&lt;/b&gt; as it will help you gain a more solid understanding.You can also run the application on your computer.       &lt;br /&gt;We will assume you already know &lt;a href="http://www.dotnetlead.com/wcf/HTTPS-SetUp-1" target="_blank"&gt;how to setup WCF to run in https&lt;/a&gt;&lt;b&gt;&lt;/b&gt;, since basic authentication without https would be meaningless because the user name and password would be passed as plain texts in the network.       &lt;br /&gt;&lt;b&gt;Topics&lt;/b&gt;       &lt;br /&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;    &lt;p&gt;We will show you:&lt;/p&gt;    &lt;ul&gt;     &lt;li&gt;How to setup the database and the Web Site Administration Tool from the .net framework for managing the Users and Roles &lt;/li&gt;   &lt;/ul&gt;    &lt;ul&gt;     &lt;li&gt;How to setup the WCF Basic Authentication under https and use SQL Membership Provider to validate users and roles &lt;/li&gt;   &lt;/ul&gt;    &lt;ul&gt;     &lt;li&gt;How to make your WCF service consumable by other other platforms such as Java by making the WSDL a single file &lt;/li&gt;   &lt;/ul&gt;    &lt;p&gt;You can also see how to make your service consumable by any technology and also set up error handling &lt;a href="http://www.dotnetlead.com/" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;a title="Brenton House" href="http://www.brentonhouse.com" target="_blank"&gt;Brenton House&lt;/a&gt;&lt;/p&gt; &lt;!-- Place this tag where you want the +1 button to render --&gt;&lt;g:plusone href="http://weblogs.asp.net/bhouse/default.aspx" annotation="inline"&gt;&lt;/g:plusone&gt;
</description><pubDate>Mon, 07 May 2012 20:10:33 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/basic-wcf-authentication-with-sql-membership-provider</guid></item><item><title>Frequently Asked Questions about Free Upgrade on SkyDrive</title><link>https://weblogs.asp.net:443/bhouse/frequently-asked-questions-about-free-upgrade-on-skydrive</link><description>&lt;p&gt;[via: &lt;a href="http://windows.microsoft.com/en-us/skydrive/loyalty"&gt;http://windows.microsoft.com/en-us/skydrive/loyalty&lt;/a&gt;]&lt;/p&gt;  &lt;p&gt;You’ve been with us a long time, and through a lot of changes. We appreciate you sticking with us, and we want to make it easy for you to keep using your 25 GB of free online storage. All you need to do is go to the &lt;a href="http://go.microsoft.com/fwlink/p/?LinkID=248677"&gt;SkyDrive storage page&lt;/a&gt; and choose Upgrade my storage. That’s it—you’re locked in for 25 GB for free.*&lt;/p&gt;  &lt;h4&gt;Frequently asked questions&lt;/h4&gt;  &lt;ol&gt;   &lt;li&gt;     &lt;p&gt;Why is the storage limit changing?        &lt;br /&gt;When designing the new SkyDrive, we wanted to create personal cloud storage that was both powerful and that had enough storage to meet the needs of most people—for free. The new SkyDrive offers 7 GB of storage. That’s enough for 20,000 Office docs or 7,000 photos. And unlike before, you can upload big files (up to 2 GB) and automatically sync files or entire folders to SkyDrive right from your PC.&lt;/p&gt;      &lt;p&gt;We also wanted to offer additional storage options for people who needed more, without applying a single limit to everyone. So we now offer affordable plans to add up to 100 GB of additional storage to SkyDrive.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;What are the new features?        &lt;br /&gt;SkyDrive for PC or Mac: Install SkyDrive on your computer and you can access files in your SkyDrive right from your desktop—online or offline. Files in your SkyDrive folder are automatically kept up to date across your PCs and Macs. Available for Windows 8 Consumer Preview, Windows 7, Windows Vista, and Mac OS X Lion.&lt;/p&gt;      &lt;p&gt;Apps for Windows Phone, iPhone, and iPad: Get to your files while you’re on the go with the new SkyDrive for iPad app and updated apps for Windows Phone and iPhone. And of course you can still go to &lt;a href="http://go.microsoft.com/fwlink/p/?LinkID=248907"&gt;SkyDrive.com&lt;/a&gt; from your phone’s browser.&lt;/p&gt;      &lt;p&gt;Fetch files: Forgot to put a file in your SkyDrive folder? You can access any file stored on your PC running Windows from &lt;a href="http://go.microsoft.com/fwlink/p/?LinkID=248907"&gt;SkyDrive.com&lt;/a&gt;.&lt;/p&gt;      &lt;p&gt;Increased upload sizes: Now you can upload and share files up to 2 GB.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;What happens if I don’t upgrade my storage? Will I lose my stuff?        &lt;br /&gt;No. In the new SkyDrive, everyone gets 7 GB of free storage. If you were using close to this amount before the latest update, we’ve automatically upgraded your storage already . You can always see how much storage you have by signing into SkyDrive and checking the storage meter.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Where can I go to learn more?        &lt;br /&gt;You can get more information about SkyDrive on our website. If you have any questions, you can get answers in the &lt;a href="http://go.microsoft.com/fwlink/p/?LinkID=242002"&gt;SkyDrive forum&lt;/a&gt;.&lt;/p&gt;   &lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;&lt;a title="Brenton House" href="http://www.brentonhouse.com" target="_blank"&gt;Brenton House&lt;/a&gt;&lt;/p&gt; &lt;!-- Place this tag where you want the +1 button to render --&gt;&lt;g:plusone href="http://weblogs.asp.net/bhouse/default.aspx" annotation="inline"&gt;&lt;/g:plusone&gt;
</description><pubDate>Mon, 07 May 2012 12:33:17 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/frequently-asked-questions-about-free-upgrade-on-skydrive</guid></item><item><title>Microsoft Cloud services are changing... Windows Live is dead.  Long live SkyDrive.</title><link>https://weblogs.asp.net:443/bhouse/microsoft-cloud-services-are-changing-windows-live-is-dead-long-live-skydrive</link><description>&lt;p&gt;&lt;em&gt;&lt;a href="http://blogs.msdn.com/b/b8/archive/2012/05/02/cloud-services-for-windows-8-and-windows-phone-windows-live-reimagined.aspx" mce_href="http://blogs.msdn.com/b/b8/archive/2012/05/02/cloud-services-for-windows-8-and-windows-phone-windows-live-reimagined.aspx"&gt;http://blogs.msdn.com/b/b8/archive/2012/05/02/cloud-services-for-windows-8-and-windows-phone-windows-live-reimagined.aspx&lt;/a&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;We have talked quite a bit about SkyDrive and using your Microsoft account for the sign-in and roaming capabilities of Windows 8. These are just two aspects of a broad service infrastructure that you can tap into when using Windows 8 (and Windows Phone, Xbox LIVE, and a host of other services and apps). We want to talk more about the capabilities and features of cloud services for Windows 8 and Windows Phone. To get started, Chris Jones, the VP of our Windows Live group responsible for the development and operations of all of the services and apps, authored this post to introduce the reimagined role of cloud services in Windows 8.        &lt;br&gt;--Steven &lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://blogs.msdn.com/b/b8/archive/2012/05/02/cloud-services-for-windows-8-and-windows-phone-windows-live-reimagined.aspx" target="_blank" mce_href="http://blogs.msdn.com/b/b8/archive/2012/05/02/cloud-services-for-windows-8-and-windows-phone-windows-live-reimagined.aspx"&gt;&lt;img style="border: 0px currentColor; padding-top: 0px; padding-right: 0px; padding-left: 0px; display: inline; background-image: none;" title="image" border="0" alt="image" src="http://lh3.ggpht.com/-QTtg02C70-Q/T6GGrJbl4PI/AAAAAAAAHQA/e18TO2xRq_U/image%25255B4%25255D.png?imgmax=800" width="766" height="584" mce_src="http://lh3.ggpht.com/-QTtg02C70-Q/T6GGrJbl4PI/AAAAAAAAHQA/e18TO2xRq_U/image%25255B4%25255D.png?imgmax=800"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a title="Brenton House" href="http://www.brentonhouse.com" target="_blank"&gt;Brenton House&lt;/a&gt;&lt;/p&gt;
&lt;!-- Place this tag where you want the +1 button to render --&gt;&lt;g:plusone href="http://weblogs.asp.net/bhouse/default.aspx" annotation="inline"&gt;&lt;/g:plusone&gt;
</description><pubDate>Mon, 07 May 2012 03:32:00 GMT</pubDate><guid isPermaLink="true">https://weblogs.asp.net:443/bhouse/microsoft-cloud-services-are-changing-windows-live-is-dead-long-live-skydrive</guid><category>Brenton House</category><category>Cloud</category><category>Community News</category></item></channel></rss>