We've added six APIs to the ProgrammableWeb directory in categories such as Reputation, Tools, Notifications, and Healthcare. We've also added several SDKs for use with Orchestrate.io, a Database-as-a-service for application developers. Here's a rundown of the new additions.
AT&T APIs (14)
AT&T M2X Keys
||This API allows you to manage master, device, collection, and distribution keys for all resources or a device or stream while using the AT...||Internet of Things||07.28.2016|
AT&T M2X Distribution
||Manage M2X device distributions using this API. It will allow you to represent a group of Devices that begin with the attributes of the original device template when created. ATT M2X is a cloud-...||Application Development||07.28.2016|
AT&T M2X MQTT
||This API from ATT uses the MQTT protocol to streamline the connection between devices and M2X. This allows you to build applications and services as well as gather and translate data in real-time....||Application Development||07.28.2016|
AT&T Authentication Management
||This API is used with all RESTful ATT API's to authenticate their wireless customers private customer related information. Customers can authorize third-party apps to provide details such as user...||Authentication||07.28.2016|
AT&T Emergency Services
||This REST ATT Emergency API associates the user's telephone number with a physical location. It uses Enhanced 911, E-911 or E911. This is a system that links urgent callers with public resources for...||Emergency||07.27.2016|
With Pokémon GO seemingly taking over the world as players walk around in search of the virtual creatures, one developer used the Watson Visual Recognition API to analyse screen shots of the app to locate nearby Pokémon, winning Best Use of Watson challenge at the AT&T Shape Tech Expo Hackathon.
Yesterday marked the tech industry's advocacy action, The Day We Fight Back. This campaign is aimed at raising awareness of the National Security Agency's (NSA's) mass surveillance program which is collecting content and metadata from e-mails, chats and social networks; harvesting contact lists; and gathering billions of records each day on cellphone locations, according to The Washington Post.