The latest news on the API economy
Searching: No Search Term , Filtered By Category: "Mapping", Category: "Games", Category: "Social", Category: "Video", Category: "Security", Category: "Games"
The previously popular Google Earth API is being deprecated and is due to shut down in early 2016, signalling the end of access to its 3D imagery via the API. This post by Timothy Whitehead for Google Earth Blog looks at four applications that used to use the API, and what they are using now.
Supercell announced a limited beta for its new Clash of Clans Developer API. The API grants access to Clan search, global/local leaderboards, Clan and player profiles, leagues, and more features are expected in the near future. Register for access and provide feedback to propel the project forward.
Sickweather is known for its real-time illness tracking. Where hospitals and government agencies take weeks to report illness trends, Sickweather scans social media outlets for real-time tracking and reporting. Now, Sickweather has made the API behind the tracking service available to developers.
A look at the new U.S. General Servisces Administration's Digital Registry API which compiles all 6,000+ social media accounts managed by U.S. Government agencies, and a look at six ways external developers can make use of the API to build innovative products and create new analytics services.1
As part of their bi-annual State of Software Security (SOSS) Report, Veracode released the findings of the Fall 2015 publication. Drawing on more than a trillion lines of code, the report shows that some programming languages and platforms suffer from more security risks than others.
Lockr, a new key management service for content management systems is now available for Drupal and WordPress. Lockr provides an off-site, hosted key management service that can help secure Drupal and WordPress powered websites as well as meet PCI DSS, HIPAA and other security requirements.
Google has long fielded complaints of sign-in requirements associated with Google Play Games. The Google+ requirement and multiple sign-ins required for multiple games has been a hotbed of frustration. Google announced the end of both requirements as part of a Google Play Games API model change.
If your app uses OAuth as a means of authentication, you are likely storing users' OAuth tokens in a database. To maintain the secrecy of these tokens, you can use encryption both in transit and at rest. This article shows how SecureDB can encrypt OAuth tokens in a matter of minutes.
The recent experience of mapmaker RouteBuilder highlights one of the key issues that needs to be addressed when consuming APIs: how to manage the risk associated with an API becoming unavailable? Businesses consuming open APIs in their products need to take these risk management actions.
A brand new iOS messaging/social app called Peach has rocketed in popularity since launching last Friday. A developer has reverse engineered the Peach API and created clients for Swift and Mac. The clients have been posted on GitHub for developers interested in using the undocumented Peach API.
A cornerstone feature of any Web application is the login page. This article take you step by step through the process of adding phone number powered second factor authentication (2FA) to a Web application by taking advantage of Nexmo's Verify API. This tutorial requires knowledge of PHP.
A number of ad tech sources reported that Snapchat has engaged select ad partners for an advertising API development. Snapchat declined to comment, but many have anticipated an advertising API from Snapchat. While an ad API makes sense, Snapchat has an unfortunate history with API vulnerabilities.
Developers are opting for phone verification over email verification as it is effective in reducing spam accounts. Adding phone verification to your app doesn't need to be complex. This tutorial shows how to use Nexmo Verify SDK for iOS in a "To-Do List" application that uses Parse for a backend.
Secret API Keys add a layer of security to APIs and who can access what functions, but a simple flaw in the common implementation in GitHub leaves many API Keys exposed to external developers. This tutorial by Moshe Shaham explains this error, as well as how to leverage it to find API keys.
As more security vulnerabilities in IT software are discovered and exploited by malicious endeavours, Cisco has released its openVuln API that automates the sharing of security vulnerability information in a move aimed at nurturing an open security automation standard across the industry.
Six APIs have been added to the directory in categories such as Banking, Content Management, and Advertising. Included today is the Plone CMS API, which allows programmatic access to the open source content management system. Here, we summarize the new additions and how they can assist developers.
Target is on the data breach hot seat again, just two weeks after settling its massive 2013 data breach. This time, an API vulnerability tied to the Target app wishlist functionality led a security firm to easily retrieve personal information from app users. The API requires no authentication.
Earlier this year, Facebook launched an embedded video player. To ease integration between the player and third party websites, Facebook has now announced API access to the player. In addition to the API, Facebook now supports the oEmbed open standard, which simplifies embedding Facebook material.
We've added seven APIs to the ProgrammableWeb directory in categories including Application Development, Video, Cloud, and Email. Featured is an API for use with Videolean professional video creation platform. Also new to the director are several Node.js frameworks. Here's a summary of what's new.