Single purpose API
Following an all night hack, a spirited game of 2 am laser tag, a voting finale in speed-geek format (think speed dating for hackers), and with the support and advice of over 15 developer evangelists from some of the leading API providers, the winners of ProgrammableWeb’s first APIcon hackathon were announced yesterday at APIcon. Winners included two security camera apps, an automated travel expenditure app for the connected car, and a machine language chat support client. Teams were given one main criteria (to use as many of the sponsored APIs as possible) and encouraged to unleash their creativity.
Everywhere anyone looks these days it seems like there is a video surveillance camera somewhere nearby. But there’s a world of difference between capturing video and actually be able to turn those videos into a form of an intelligence that someone could actually act on.
||The NetIQ API integrates identity verification and user authentication into applications. It is available in REST architecture with JSON protocols. NetIQ provides security, identity, and asset...||Identity||09.22.2016|
Oracle Cloud Stack Manager
||The Oracle Cloud Stack Manager REST API allows developers to access and integrate the functionality of Oracle Cloud Stack Manager with other applications and websites. Some example API methods...||Cloud||09.21.2016|
Wapack Labs Cyberwatch
||The Wapack Labs Cyberwatch API integrates domain search into applications. It aims to be useful for security purposes, monitoring web activity. Available in JSON and CSV formats with API Key. Wapack...||Intelligence||09.16.2016|
||The Bitport API allows developers to create torrent related extensions and plugins. The Bitport platform is used to download torrents to the cloud, and play them online. All the work is done by...||Torrents||09.07.2016|
PerimeterX Bot Defender
||The Bot Defender API is a service that protects websites from attacks such as price-scraping bots, brute force attacks, and click fraud. This service uses an approach based on dynamic behavior...||Security||09.05.2016|