{"id":2118,"date":"2018-12-04T17:54:41","date_gmt":"2018-12-04T17:54:41","guid":{"rendered":"https:\/\/enrichedrealestate.com\/blog\/?p=2118"},"modified":"2018-12-04T17:54:41","modified_gmt":"2018-12-04T17:54:41","slug":"accessingbigdata","status":"publish","type":"post","link":"https:\/\/enrichedrealestate.com\/blog\/2018\/12\/04\/accessingbigdata\/","title":{"rendered":"How Do You Access Big Data?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Technical professionals integrate routines, protocols, and tools for building software and applications under Application Programming Interface (API), Virtual Private Network (VPN) or Public Access to the database with an API to be the preferred strategy.<\/span><\/p>\n<h3><strong>Why an API Strategy?<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Software applications are numerous and few have been connected to databases. \u00a0Connecting data to software applications through an API allows a digital transformation, i.e. a universal software connector.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">APIs can be quickly employed without affecting the database or the application.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Developers proficient in difference ecosystems can connect through APIs.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">REST (Representational State Transfer) APIs easily stage the data for universal connectivity to applications.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">APIs employ security protocols, including password protections.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">APIs provide security mechanisms to manage output and input of data.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Businesses use API implementation for flexibility in small scale projects.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">A client can access national real estate information and related people contact database records contained in a Structured Query Language (SQL) database. \u00a0SQL is used to communicate with a database. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Database integrity should cover three critical security areas:<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Physical Security;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Operational Security; and<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">System Security.\u00a0<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\"> \u00a0<\/span>Physical security provides for card, fingerprint, and facial feature requirements.<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Access to select employees that are screened and designated as technicians.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">24-hour personal security<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>Operational security monitors and limits access to confidential information.<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Encrypted data transmission<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Destruction of customer data<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Audit trail<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>System security with hardened operating systems (OS) requires periodic patching.<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Monitoring and upgrading fire-wall systems to block unauthorized access.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Redundant backup systems to protect data integrity.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Virtual private network to prevent unauthorized access.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Intrusion detective devices.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">API writers need to have extensive backgrounds in programming and technical writing; with extensive programming background in the .NET Framework under \u201cmanaged code\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Collecting behavioral data on people is an important factor in big data processing. \u00a0<\/span><b>But that data needs to be processed in such a way that it becomes an enhancement to basic real estate economics; occupancy, rental rates, sale prices, operating expenses and capitalization rates.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technical professionals integrate routines, protocols, and tools for building software and applications under Application Programming&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2904,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,14],"tags":[],"class_list":["post-2118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-investors","category-real-estate"],"_links":{"self":[{"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/posts\/2118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/comments?post=2118"}],"version-history":[{"count":0,"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/posts\/2118\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/media\/2904"}],"wp:attachment":[{"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/media?parent=2118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/categories?post=2118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enrichedrealestate.com\/blog\/wp-json\/wp\/v2\/tags?post=2118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}