Menu Home

HTTP/2 and gRPC

This entry is part 3 of 4 in the series Engineering in Orfium

Software applications have dramatically evolved over the last few years, as they are getting more capable, more complex and offer more and more functionalities. For the purpose of these functionalities, various services have to interact and coordinate each other. These services have to be as efficient and fast as possible, […]

#APIs in the Travel Industry

What is an API? This is one of the issues we have been dealing with, since the first day of this blog. I started uploading articles and opinions on that, as well as tutorials. Dealing with this question again doesn’t feel like repeating myself, but more like I want to […]

Uniform Interfaces in a Nutshell

API Standard

The uniform interface constraint defines the interface between clients and servers. It simplifies and decouples the architecture, which enables each part to evolve independently. The four guiding principles of the uniform interface are: Resource-Based Individual resources are identified in requests using URIs as resource identifiers. The resources themselves are conceptually […]

Artificial Intelligence Offerings as an #API

Artificial Intelligence

Artificial intelligence is very important for businesses today but also for saving humans’ lives.
There are many domains of applications and thus the offerings are growing and growing. There are many AI services today, starting from the IBM watchon and the whole and the whole idea of cognitive computing, then we have all the AWS family of services the focus on making AI applicable to everyone.
Microsoft, Google also have massive offerings that even an individual can use and take advantage of.
In this article we focus on analysing some of the areas of applications for such APIs, and simple describe some alternatives if you are interested in building your own AI either for business of your next homegrown project.

APIs for Authentication: A journey

APIs - API

Application Program Interface (API) key authentication is a technique that overcomes the hurdles of using shared credentials by using a unique key for each user. The key is usually in the form of a long series of letters and numbers that are different from the account login password. The owner […]

Build Your Own Udemy

Build Your Own Udemy

Today we all are living in technological driven world where online learning has become an important and totally worthwhile way of learning on-the-go. Now our future of higher education lies in the hand of the online learning system. Nowadays college and university students find themselves burdened with Jobs and family […]