Mashups using the same API (3401)
Map with latest news about the October 2007 wildfires in southern California. Includes fire areas and meeting points for evacuees, as well as nearby emergency services such as hospitals.
Inspired by the mock interviews featured on Late Night With Conan Oâ€™Brien, LipMe allows users to cut the mouth out of any face - a newly taken picture of a friend, celebrity, animal or even an...
Daylogs shows daily webtrends for Germany and gets some similar videos.
Less than a month ago, Google made all public activities available via its "firehose." Last week, the search giant updated the Buzz API again with several interesting features, including a limited firehose, which is calls a "garden hose."
Social influence ranking service PeerIndex now provides more granular rankings of users. Besides the overall influence score of a user, called PeerIndex (PI), the service now provides the so called ‘topical PeerIndex’ (tPI).
||The DeTor REST API provides security and micro services that identify requests from TOR network. It is available in JSON format and it allows to wrap the TorDNEI, a public active tester.||Security||07.09.2017|
Open Banking Payment Initiation
||The Payment Initiation API Specification describes the flows and payloads for initiating a single immediate domestic payment. The endpoints allow a PISP to; Register an intent to setup a payment...||Banking||07.06.2017|
Open Banking Account and Transaction
||This API is an Open Banking standard that allows you to register an intent to retrieve account information by creating an “account request”. This registers the data “permissions”, expiration and...||Banking||07.06.2017|
Pandascore Live Websocket
||The Pandascore Live Websocket API allows developers to access and integrate the functionality and data of Pandascore with other applications. Some example API methods fetching events and connecting...||Sports||07.06.2017|
Active Intrusion Detection
||The Active Intrusion Detection API detects when fragments of sensitive data are sent to third parties with insecure connections and alerts network administrators. Further security measurements can be...||Security||07.06.2017|