Mashups using the same API (1413)
mybill.is is a social media payments system. Connects social media networks with payment systems to quickly and easily create bills and manage them on the go.
Site builds a web cloud based off content which ties directly to a product search using the Amazon Search API.
Bookmark all your favourite videos,sightseeing,pictures on a world map.
Cloud-based mobile app develop platform and MBaaS provider Appery.io has integrated the open source Ionic SDK to help developers build hybrid mobile apps more easily.
Photo Hack Day 4 erupts April 6th, and runs nonstop through the weekend. The first Photo hack Day brought together photographers, web designers, photo editors, and computer scientists for the first image-centric hackathon. Since the original 200 hackers threw together almost fifty mashups in a single weekend (two years ago), Photo Hack Day has blossomed in number, creativity, and excitement as it readies itself for a fourth rendition. Lead sponsors Aviary and Facebook look forward to "[a]nother full weekend of photo centric awesomeness."
Periscope Data CSV
||The Periscope Data CSV API can be activated from a unique URL available on the documentation site. Users can integrate a chart with R, Python, and Google Sheets help. Periscope Data unifies data from...||Charts||06.22.2016|
Crosswalk Project Embedding
||The Crosswalk Project Embedding API integrates HTML loader inside Android applications. The Crosswalk Project is an open source, web application runtime built with Chromium and Blink from Google.||Application Development||06.21.2016|
Crosswalk Project Web
||The Crosswalk Project Web API include multimedia...||Application Development||06.21.2016|
||The Tableau REST API provides HTTP access to programmatic solutions for managing and manipulating the functional resources of the Tableau server. The API allows users to access a variety of...||Application Development||06.15.2016|
||The LeakedSource API is a data filtering tool for detecting user profiles that may have been hacked and posted to leaked databases. It is a security solution for protecting the individual profiles...||Security||06.15.2016|