These are news items I've curated in my Google Reader, Twitter and bookmarking using Pinboard. Sometimes I add a little commentary to each post.
I use many of these curated links in my research and writing. If you are interested in receivig data feeds of all my curated, please let me know.
Notice: Undefined variable: CuratedTag in /var/www/html/apievangelist/news/index.php on line 47 Notice: Undefined variable: CuratedTag in /var/www/html/apievangelist/news/index.php on line 52 dev.twitter.com on 06/11/2013
Excerpt: The Twitter platform is constantly evolving and there is frequent change. If you have an integration that's no longer working, be sure and review the developer blog, platform calendar, recent tweets by the @twitterapi account, the API status dashboard, recently updated documentation and Twitter's status blog at http://status. twitter. com How can I keep up with changes to the Twitter API? There are a few great ways to follow the changes we make to the Twitter platform: Follow @twitterapi. Keep track of our Developer Blog and Discussions. See the recently updated documentation. Consult the Platform Calendar. How do I count out 140 characters?... read the full post.
Tags: , , API-Evangelist, API-Stack, Deprecation, Twitter
www.infoworld.com on 06/11/2013
Excerpt: Last week, news broke that the NSA has been spying on Verizon customer in the United States. The bulletin came via the Guardian, which had obtained a copy of a secret court order allowing the NSA to spy on millions of Verizon customers. As reported by Glenn Greenwald: "The document shows for the first time that under the Obama administration the communication records of millions of U. S. citizens are being collected indiscriminately and in bulk -- regardless of whether they are suspected of any wrongdoing. " This development has multiple implications for U. S. citizens, but high-tech industries will feel a distinctive hit. It seems that we only recently addressed fears over the Patriot Act and the notion that the U. S.... read the full post.
Tags: , , API-Voice, NSA
www.slideshare.net on 06/11/2013
Excerpt: Michael McLaughlin, Application Support Analyst at Personal Wow. not just food for thought. I always knew that posting my resume on SlideShare was working against me. I'm going to follow your lead and create a deck based on STAR Statements (Situation Targeted Action and Results, summarized in a single statement). Can't wait to upgrade my deck and replace that dysfunctional mess on my LinkedIn page. Thank you for sharing this.... read the full post.
Tags: , , NSA
Maker Challenge: WordPress plugin for displaying related items from the DPLA | THATCamp Center for History and New Media 2013 (aka THATCamp Prime)chnm2013.thatcamp.org on 06/08/2013
Excerpt: The DPLA has lots of cool content, and WP DPLA is a way to help your readers discover and explore that content. It takes the tags you’ve assigned to your post – say, cheesehead and Packers or pizza, beer, and nachos – and fetches four random items from DPLA’s partner collections, and displays them at the bottom of the post. WP DPLA in action The plugin has a couple of nifty features: Getting an API key from DPLA requires sending a cURL request. WTF, you say? The WordPress plugin has a button that’ll send the request for you, and a handy form where you can enter the API key when you’ve gotten it via email. For the sake of variety, the items will cycle.... read the full post.
Tags: , , API-Evangelist, API-Stack, Digital Public Library of America, DPLA
techland.time.com on 06/08/2013
Excerpt: Most splashy inventions have science fiction analogues, appearing in film, television or print long before popping up in real life, like: Star Trek‘s medical tri-corder, Harry Potter‘s invisibility cloak or The Transformers‘ metamorphosing robot animals. But a cloak that can blink data out of time itself? Let’s say you want to hide something you’re doing online, like sending a text message or transferring a file to someone. Nowadays you might choose to encrypt that data, but even if someone listening wasn’t able to crack your encryption scheme, there’s still evidence something was sent. The real trick, if you wanted to cover your tracks, would be devising a way to conceal the transmission itself.... read the full post.
scripting.com on 06/07/2013
Excerpt: First an update on today's earlier blog post. Apparently Google Reader does not support reading lists. I think when I asked the question, the 140-character limit on Twitter made it impossible for an accurate answer. No matter what, maybe it would be a good idea now to try to give a complete technical explanation of what a reading list is. 1. There are many kinds of "feed consumer" apps, all of them are capable of supporting reading lists, not just feed readers or aggregators. In the rest of this piece I'll use the shorthand "FC" to refer to a feed consumer app. 2. When you subscribe to a feed you're telling the FC that you want it to periodically read the contents of that feed and somehow act on the new items in the feed.... read the full post.
www.nytimes.com on 06/07/2013
Excerpt: SAN FRANCISCO — When government officials came to Silicon Valley to demand easier ways for the world’s largest Internet companies to turn over user data as part of a secret surveillance program, the companies bristled. In the end, though, many cooperated at least a bit. Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations. They opened discussions with national security officials about developing technical methods to more efficiently and securely share the personal data of foreign users in response to lawful government requests. And in some cases, they changed their computer systems to do so.... read the full post.
www.infoq.com on 06/07/2013
Excerpt:... read the full post.
Tags: , , Apistrat, Events
Why the NSA has access to 80% of online communication even if Google doesn’t have a “back door” – Quartzqz.com on 06/07/2013
Excerpt: "[W]e have not joined any program that would give the U. S. government—or any other government—direct access to our servers," says Google CEO Larry Page. AP/Jeff Chiu Why the NSA has access to 80% of online communication even if Google doesn’t have a “back door” By Christopher Mims — June 7, 2013 Google CEO Larry Page just said in a blog post that Google has never heard of a program called “PRISM,” and that the US government does not have “direct access” to Google’s servers, as alleged by recent media reports.... read the full post.
Tags: , , API-Voice, NSA
online.wsj.com on 06/07/2013
Excerpt: Companies that build software for app makers to send messages to users, accept payments, track analytic information, store data and more are drawing interest from customers and investors as developers race to build more features into their applications. Among them are upstarts like Twilio Inc. , a San Francisco-based company that offers notification technology, along with other tools. Customers include the car-service Uber Inc. , which uses Twilio to send riders text messages when their rides arrive, and TaskRabbit Inc. , which texts people who perform on-demand tasks for the service to see if they are available to jump on new ones.... read the full post.
Tags: , , API-Evangelist, API-Stack, Mobile
|1 2 3 4 5 6 7 8 9 10 11 12 13 14 15||Next >>|