Mashups using the same API (26)
Free property listings for rentals and home sales around the world.
Lots of handy tools that let you profile any the 87,058,540 Internet domains in existence. In addition to indexing every active domain, it also knows about the 237,192,827 inactive domains that have...
Protect.ly is a software-as-aservice that aims to help developers, designers, and teams to protect digital products from pirates such as site templates, eBooks, plugins, and extensions with the goal...
Marketing and demand-side platform provider MediaMath has opened access to Facebook Exchange inventory through its T1 Platform API.
Fiorano releases a secure, B2B integrated, and enterprise-ready API management platform designed for companies to monitor and distribute their APIs.
Viggle, a mobile platform that offers incentives to users for consuming media, announces new ways for users to acquire points by using HitFix.
||The Teradata DMC API lets developers pull data into DMC (Digital Marketing Center) and extract information for use in other applications. Teradata DMC is an email marketing SaaS that lets users plan...||Marketing||09.25.2015|
MapFruition Demographic Inquiry
||The MapFruition Demographic Inquiry API is available in JSON format with an API Key. The API allows users to integrate demographic features such as population summaries, income, consumer expenditures...||Mapping||09.24.2015|
MapFruition Spatial Operations
||The MapFruition Spatial Operations API is available in JSON format and accessible with an API Key. The API allows developers to integrate GIS features into web services and web applications. With the...||Mapping||09.24.2015|
||Trooclick’s WhoSaidWhatNews API is all about who said what in the news - via quotes – extracted automatically using NLP technology. The API allows developers to enrich their content and enhance their...||News Services||09.21.2015|
||The Pyrus API aims to automate business tasks and improve customer relations. Developers can register their application to obtain a Client ID and Secret Key. Then, they can access methods to...||Automation||09.18.2015|