ITC 3303-21.01.02-6A25-S1, Information Systems Management Unit III PowerPoint Presentation For decades, relational databases remained essentially

ITC 3303-21.01.02-6A25-S1, Information Systems Management

Unit III PowerPoint Presentation

For decades, relational databases remained essentially unchanged; data was segmented into specific chunks for columns, slots, and repositories, also called structured data. However, in this Internet of Things (IoT) era, databases need to be reengineered because the very nature of data has changed. Today’s databases need to be developed with the needs of IoT in mind and have the ability to perform real-time processing to manage workloads that are dynamic. For example, relational databases should be able to work with real-time data streaming and big data (an example was presented in the unit lesson).

Scenario: eHermes wants their personnel to be able to view security video footage in real-time and provide them with the ability to query video footage for viewing. Choosing a database solution such as MongoDB would allow eHermes to store mobile self-driving video footage in the same database as the metadata.

To do this, eHermes needs a way to manage the demands of real-time data streaming for real-time analytics. Conduct some research for a NoSQL database application such as MongoDB or Cassandra that could meet this need. How would switching to a real-time database solution help eHermes remain competitive? Create a PowerPoint presentation that does the following:

  • Provides a brief introduction to IoT.
  • Presents an argument to the eHermes CEO that switching to a more dynamic database structure (NoSQL real-time database) will meet the demands of IoT.
  • Introduces some features of the database you chose, whether it is MongoDB, Cassandra, or another database.
  • Describes how switching to a more dynamic database will give eHermes a competitive advantage?

Your presentation must be a minimum of six slides, and you must use at least two academic resources. Any information from a resource used must be cited and referenced in APA format.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Create your Cybersecurity Portfolio Portfolios are an invaluable tool in academic and professional development. They provide a powerful medium for users

Create your Cybersecurity Portfolio Portfolios are an invaluable tool in academic and professional development. They provide a powerful medium for users to efficiently collect and organize artifacts representative of work completed over time. Portfolios offer a means to demonstrate formative and/or summative progress and achievement. Portfolio authors are empowered with tools

Assessment 4: Research Proposal ReportDue date: Week 12Group/individual: IndividualWord count/Time provided: 2000 wordsWeighting: 30%Assessment 4

Assessment 4: Research Proposal ReportDue date: Week 12Group/individual: IndividualWord count/Time provided: 2000 wordsWeighting: 30%Assessment 4 DetailThis assessment requires student to develop a two-page paper with IEEE format based on previousthree assessments. It is expected that student will use this idea for further develop their Capstoneresearch project (Applied Research Project) in

I’ve attached the instructions and PowerPoint template needed for the work. To complete this assignment, you will need the attached files and the Small

I’ve attached the instructions and PowerPoint template needed for the work. To complete this assignment, you will need the attached files and the Small Merchant Guide to Safe Payments documentation (click link to download) from the Payment Card Industry Data Security Standards (PCI DSS) organization. Please read the instructions carefully and ask questions if

Design a BN for a new school building. Attached are three preliminary school blueprints. Each room will only have an instructor computer except

Design a BN for a new school building. Attached are three preliminary school blueprints. Each room will only have an instructor computer except for four labeled computer labs with 30 computers each. Create LANs to group the classrooms (determine how many per LAN by distance and location in the building) for all the teacher’s computers in the lecture halls/rooms. Each