Mashups using the same API (5)
Collection site where users can post things they collect, have, or want to trade. Uses RapLeaf as a feedback and reputation system.
Junkdepot is a free and easy way to sell all your junk. You can also find great items other people want to sell. Your listings are syndicated to other classified sites and you can find listings near...
StepRep allows you to monitor, manage and build your online reputation. StepRep searches websites, blogs, twitter, social containers and photo and video sites.
Akana has certified protection of their APIs and Web Applications from the critical security vulnerabilities listed in the OWASP Top Ten.
IBM announced the opening of its zero-knowledge proof platform, Identity Mixer to developers on the Bluemix cloud. The goal of Identity Mixer is to reduce the need for individuals to transmit personal details to online services, instead relying on a “digital membership card”.
Orange Network Info Spain
||The Orange Network Info Spain API gives developers tools to help businesses protect against identity theft and fraud. By cross-checking user device information and network details, this API helps...||Authentication||11.30.2016|
Salesforce.com Shield Platform Encryption
||The Salesforce.com Shield Platform Encryption API is a secure portal for using HTTP verbs to create, upload, import, retrieve, export, and manipulate Salesforce-hosted tenant secrets. The API is...||Enterprise||11.25.2016|
Vendasta Reputation Intelligence
||The Vendasta Reputation Intelligence API integrates the analysis of a business' character into web services. Available in JSON responses with its respective HTTP requests, developers can use the API...||Reputation||11.14.2016|
AMEX Enhanced Authorization
||This API has anti-fraud capability that allows merchants to submit additional data with an authorization request. Risk-decisioning helps to decrease fraud, improve approval rates, and reduce the...||Security||11.11.2016|
||The Fireeye API integrates cybersecurity into applications, providing HTTP requests and JSON and XML formats. Endpoints include threats, targets, and vulnerability. Use the API to analyze risk, plan...||Security||11.11.2016|