Feeds

LinkedIn wedges open API door

Developers need key first, mind

Intelligent flash storage arrays

LinkedIn has opened its platform to developers who are prepared to try and pass a rigorous application process.

Previously the business-oriented social networking site only offered a select bunch of partners access to its Web 2.0 platform, which many use as a CV hub and biz man stalking tool.

LinkedIn, which claims about 50m users, said in a blog post yesterday that it opened up code to developers to allow them to mix its API into their own social networking sites.

The company has launched a developer website that coders will be required to sign up to and request a key to allow access to the platform.

Desktop Twitter client TweetDeck has already been fiddling with LinkedIn’s API.

“Now you can easily view or take action on your LinkedIn network updates from within TweetDeck, with the full integration of the LinkedIn profile information of the person who posted the update,” said the firm’s search and platform product's veep Adam Nash. ®

Beginner's guide to SSL certificates

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.