Mashups using the same API (358)
Littera Report is a source for independent media that promotes all original content by geographic region. Site is still under development and uses Facebook, Twitter, Twilio and Twilio SMS APIs.
Simple Energy uses social and game mechanics to engage energy customers and encourage them the reduce their energy consumption.
Are you living in NYC and want to meet fun and exciting people going to the Hamptons? Have a car with a few seats to spare? Sign up to pair up with other New Yorkers headed east and skip the bus!
Appy Pie, cloud based mobile apps builder, continues to add to its list of supported APIs. Its latest additions include some of the most prevalent names in image sharing: Facebook, Flickr, Pinterest, Picassa and Instagram. The image newcomers to the Appy Pie portfolio allow developers to share images in realtime with users.
MuleSoft has launched a major upgrade to its Anypoint Platform for APIs, aimed at assisting businesses to take a design-first approach to their API strategy. The newest additions include Anypoint API Portal, Mule Studio with APIkit (an Eclipse-based GDE), and Anypoint API Manager.
||Apizee is a platform that integrates WebRTC technology, and adds real-time text, audio, and video capabilities to third party applications. This platform features visual collaboration, plugin-free...||WebRTC||06.07.2016|
||The Apizee ApiRTC API is a platform that integrates WebRTC technology, and adds real-time text, audio, and video capabilities to third party applications. This platform features visual colaboration,...||WebRTC||06.06.2016|
Web Speech Specification
Microsoft Cognitive Services Linguistic Analysis
||The Microsoft Cognitive Services Linguistic Analysis API processes language in order to gain access to part-of-speech tagging and parsing. Applications of this tool include mining customer feedback,...||Languages||05.27.2016|
Microsoft Cognitive Services Speaker Recognition
||The Microsoft Cognitive Services Speaker Recognition API identifies individual users, and authenticates by using voice. It can be used to add a layer of security to third party applications with a...||Recognition||05.27.2016|