Skip to Main Content
Amazon Hacks
book

Amazon Hacks

by Paul Bausch
August 2003
Intermediate to advanced content levelIntermediate to advanced
304 pages
7h 33m
English
O'Reilly Media, Inc.
Content preview from Amazon Hacks

Search or Browse Amazon with Watson

You can use Watson’s interface to find items at Amazon or integrate Amazon’s data into other Mac applications.

An alternative way to access Amazon.com if you’re a Mac user is to use Watson, from Karelia Software. Watson is a “Swiss army knife” of over 20 tools that access the most useful web services. Along with movie and TV listings, package tracking, telephone lookup, weather forecasts, online recipes, searching, translation, and more, Watson also features a tool for browsing and searching Amazon.com through their API.

Watson’s Amazon.com tool is divided into four sections, organized vertically (see Figure 6-12). At the top of the window (below the optional toolbar for easy access to other tools) is the search field. The user selects which “store” to search within, or a particular aspect of the selected store (such as searching by ASIN or UPC number, actor or director, etc.), enters a search term, and clicks the Find button.

Amazon and Watson integration

Figure 6-12. Amazon and Watson integration

The second section is the browser, which allows the user to browse the store hierarchically. The main stores appear in the leftmost column, and as the user selects an item, the columns to the right populate with lists of subcategories.

The third section is the result list, displaying either the search results or the featured items for a selected category. Only 10 items are loaded at ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI

From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI

Karen Renaud, Merrill Warkentin, George Westerman
Incident Metrics in SRE

Incident Metrics in SRE

Stepan Davidovic

Publisher Resources

ISBN: 0596005423Supplemental ContentCatalog PageErrata