Solved

Convert web site form to Fannie Mae 3.2 file

Posted on 2004-08-02
4
1,553 Views
Last Modified: 2016-09-06
I designed a web site for a mortgage company.  I need to convert data from a web site form into a fannie mae 3.2 file.  My client wants to take information that is submitted on a form from their web site and import it into Calyx Point(popular software in the mortgage industry). Somehow, the data from the form needs to be converted to a fannie mae 3.2 file format.  That is the file format that can import directly to Calyx Point.
0
Comment
Question by:Jenny5
4 Comments
 
LVL 25

Accepted Solution

by:
Squinky earned 500 total points
Comment Utility
It looks like Fannie Mae doesn't publish its file format, so I think you're out of luck in that approach. Fortunately according to: http://www.calyxsoftware.com/solutions/point/features.asp#dataimport Calyx point can import from ASCII formats as well as Fannie Mae. All you need to do is find out how it likes its ASCII data formatted and you should have no difficulty exporting from PHP (in whatever database your data currently resides). The best approach is to either obtain the user documentation for Point, or contact Calyx and ask them how data should be formatted - most data-tool companies are much more co-operative in telling people how to get data into their software than the other direction!
0
 

Expert Comment

by:Georgetpug
Comment Utility
The fannie mae format is a character delimited text file.
So what you would need to do is format the output of the form (or database) to the Fannie mae 3.2 format.

The output file will look something similar to:
EH                                                  
TH T100099-0021        
TPI 1.0001                              
0001  3.20 W
00ANN
01A01                                                                                      

Where the EH, TH, TPI are simply the headers for the data format.                                            
1

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Developers of all skill levels should learn to use current best practices when developing websites. However many developers, new and old, fall into the trap of using deprecated features because this is what so many tutorials and books tell them to u…
Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now