The Power of the API: Data Brings Extraordinary Services to Public

Holiday Access.png
Answer To Everything.png
Disaster Recovery Plan.png
Cloud For Dummies.png
Disaster Recovery Plan.png

Power of the API

APIs or application programming interfaces of popular services are used by numerous startups to bring valuable services to the general public. API websites such as ProgrammableWeb is one of the more popular sites offering a variety of plugins and mashup examples.

Companies such as Facebook, Foursquare and the Google’s API explorer share data with programmers, data that becomes all but the fabric of apps which can do some pretty amazing things. By combining various datasets with user input, a new killer app can provide better personalization and enhanced user experience.

Power of the API

 

There is, of course, a discrepancy between what user data is provided by an API and what the data holder actually has in store. For example, Facebook seems quite democratic in terms of providing user data – users can control what data gets shared, after all – whereas other hoarders (especially e-stores) are rather possessive of their data. Facebook’s API is, however, inevitably of a limited scale as unlike for Twitter, most of their data (like the vast majority of status updates) isn’t public. Publicly available data serves for grandiose, location-spanning projects like CityBeat, which attempts to map ‘the heartbeat’ of the city via social media updates and maps.

As for combining data, there’s a lot to tell for projects like DontEat.at that warns FourSquare users if a NYC restaurant they’ve checked in at has been flagged for possible health code violations. Here the app merges data from two ‘locations’, that is, FourSquare and a list maintained by the authorities, giving people better odds against food poisoning. Such projects showcase creative use of data and are of real use to the public.

The best results are, of course, gained when data is abundant. Such is the case for NeighborhoodScout, which aggregates Census data and other sources, visualizing with the help of Google Maps, in order to bring neighborhood data like crime rates, property prices, and much more to those wishing to relocate.

Other apps are more fun-oriented. Quizzes, personality readers and the likes don’t really influence people’s decisions, or, well, anything (except perhaps their friends’ opinion of them), but they do make good filler for the time that should be spent working.

Conclusion

There is inherent tension between the three parties involved. The big hosts want to benefit from their data, not just share it. Developers naturally want to mine the vast data archives to come up with ever crazier killer apps. Users, however, are only likely to want to share their data only if they see a tangible payoff, otherwise they’re mostly privacy advocates. There isn’t a simple solution, but it can very well be argued that the data hosts should be willing to provide user-consented access to data they are already using themselves.

By Lauris Veips

Shells.com – Your Personal Cloud Computer

Shells.com – Your Personal Cloud Computer

Personal Cloud Computer Shells, a robust virtual desktop infrastructure, ensures better performance by enabling its users to incorporate a layer of virtualization between the control server and any device that they choose. This way, it ...
Virtana

Episode 8: Managing Cloud Strategy During the Chaos of 2020, Plus an Outlook for 2021

An Interview with Kash Shaikh, CEO of Virtana Companies are wrestling with the idea of moving to the cloud, staying on-prem or finding a hybrid solution. Kash Shaikh, the new CEO of Virtana, looks at ...
Gary Bernstein

AWS General Release of Amplify Flutter

The AWS General Release of Amplify Flutter The Amazon Web Service has announced that the Amplify Flutter is now generally available in a way to help make flutter apps easier and more accessible. According to ...
Are Brain Implants the Future of Humanity?

Are Brain Implants the Future of Humanity?

Future of Brain Implants Scientists have been researching and developing brain implants that could connect the human brain to other devices in order to allow human beings to control things with their minds. But in ...
Martin Mendelsohn

Of Rogues, Fear and Chicanery: The Colonial Pipeline Dilemma and CISO/CSO Priorities

The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...

TECH ELEARNING

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.