Skip to main content

Share: API

An API (Application Programming Interface) is a set of rules and protocols that allow one software application to interact with another. It defines the methods and data formats that applications use to request and exchange information. APIs are used to allow different systems, services, or components to communicate with each other.

APIs typically work by defining endpoints (URLs) where one system can send requests, and the system receiving the request processes it and sends a response back. Here's a basic overview of how the process works:

1. Client (Requester): The system (or program) that initiates the request. This could be a user interacting with an app, or a program that needs to fetch data from another service.

2. API Endpoint: An endpoint is a specific URL or URI (Uniform Resource Identifier) on the server that defines where the request should be sent.

3. Request: The client sends an HTTP request to the API endpoint. This can be one of several types:
GET: Retrieve data.
POST: Send data (e.g., create a resource).
PUT/PATCH: Update data.
DELETE: Delete data.

4. Server: The server hosts the API, processes incoming requests, performs the requested action, and sends back a response.

5. Response: After processing the request, the server sends a response back to the client. This could be in various formats, commonly JSON (JavaScript Object Notation) or XML. The response typically includes a status code indicating success (e.g., 200 for OK) or failure (e.g., 404 for not found).

Popular posts from this blog

Share: A little bit about e-Invoicing (07/07/2025)

With Malaysia's push toward digital tax compliance, e-Invoicing will soon become mandatory for all businesses, big or small. Spearheaded by the Lembaga Hasil Dalam Negeri (LHDN), this new system aims to improve transparency, reduce fraud, and automate tax reporting. Whether you’re a corporation or a small business owner, understanding how e-Invoicing works is crucial. 🔍 What is E-Invoicing? E-Invoicing is the process of issuing and receiving invoices electronically, using a structured digital format (like JSON or XML) that allows for automatic validation and processing by the tax authority. Unlike PDF or paper invoices, e-Invoices are machine-readable, submitted in real time, and stored digitally with built-in authentication, including QR codes and digital signatures. Once submitted through LHDN’s MyInvois system, the invoice is validated and becomes an official legal document, complete with a timestamp and unique identifier. This system removes the need for paper documentation an...

Share: Programming Languages

Programming languages are essential tools that enable humans to communicate with computers, instructing them to perform specific tasks. These languages serve as a bridge between human understanding and machine execution, allowing developers to create a wide range of software applications. In this comprehensive overview, we'll explore the history, types, and characteristics of programming languages. History of Programming Languages: The history of programming languages can be traced back to the mid-19th century, with the development of early mechanical computers. Ada Lovelace, often regarded as the world's first programmer, wrote algorithms for Charles Babbage's Analytical Engine in the 1840s. However, the true evolution of programming languages gained momentum in the 20th century. 1. Machine Code and Assembly Language: The earliest "programming" involved manually toggling switches or setting wires on early computers to input binary instructions directly. As techno...

Share: Two-Factor Authentication (2FA)

Understanding Two-Factor Authentication (2FA): How It Works and Why It Matters Two-Factor Authentication (2FA) adds an extra layer of security to your online accounts by requiring not just a password, but a second method of verification. This makes it significantly harder for unauthorized users to gain access, even if they know your password. How 2FA Works When 2FA is enabled, logging into your account requires two things: Something you know – e.g. your password Something you have or are – e.g. a mobile device, fingerprint, or security key This second factor provides an additional checkpoint that only the real account owner should be able to pass. Common Types of 2FA Text Message (SMS) - A one-time code is sent to your registered phone number, which you must enter during login. Authenticator App - Apps like Google Authenticator, Microsoft Authenticator, or Authy generate time-sensitive verification codes, often considered more secure than SMS. Biometric Verification - Physical characte...