
Growth Acceleration Partners | May 29, 2024
What to Know Before You Implement Public-Facing APIs
A public-facing API is a good way for others to connect to your systems. But don’t start building one until you answer these questions. There’s a lot to be said for creating an API and making it publicly accessible. Public-facing APIs enable people to connect to your systems, which can extend a business model or […]
Read More
Growth Acceleration Partners | January 29, 2024
API Security: What You Need to Know About Rate Limits and Access Keys
APIs facilitate connections between data and software integration — making them foundational to digital networks. But as online communication infrastructure proliferates, cybersecurity risks have developed into a ubiquitous threat, making API security a pressing concern for operations across the board. Two fundamental components of this security are rate limits and access keys, each of which […]
Read More
Growth Acceleration Partners | December 16, 2023
Master the API Security Best Practices for Ultimate Protection
Application programming interface (API) security best practices play a frontline role in protecting digital assets. Enabling seamless data exchanges between applications and devices, APIs represent a critical cog in an increasingly interconnected digital landscape. Of course, hackers and cybercriminals also know this. So, APIs have become one of the most common attack vectors that malicious […]
Read More
Growth Acceleration Partners | November 13, 2023
Back-End API Development: Transform and Innovate Your Business Model
We can all agree that mobile applications make our lives more convenient. But while apps are generally easy to use, the back-end comprises a string of complex parts. Solid back-end API development is critical to ensure that your app works seamlessly and benefits your business model. Let’s explore the ins and outs of back-end API […]
Read More
Growth Acceleration Partners | August 3, 2022
Labs Notes: Exploring GraphQL for Web APIs – Introduction and Thoughts
An introduction to building robust APIs using GraphQL — an open-source data query language and runtime for building scalable Web APIs.
Read More
Growth Acceleration Partners | March 29, 2017
Lab Notes: Image Detection with Rekognition Part II
We recently tested Rekognition’s image detection capabilities with photos from a cell phone camera, so next we decided to automate the process with photos from a Raspberry Pi camera module. We used a motion sensor we had set up in one of our previous projects to begin work on our desired motion-activated identity verification system. With that in mind, we set the Raspberry Pi and camera up on a desk in one of our office rooms, pointed it at the door, and got to work.
Read More