ITC 3303-21.01.02-6A25-S1, Information Systems Management Unit III PowerPoint Presentation For decades, relational databases remained essentially

ITC 3303-21.01.02-6A25-S1, Information Systems Management

Unit III PowerPoint Presentation

For decades, relational databases remained essentially unchanged; data was segmented into specific chunks for columns, slots, and repositories, also called structured data. However, in this Internet of Things (IoT) era, databases need to be reengineered because the very nature of data has changed. Today’s databases need to be developed with the needs of IoT in mind and have the ability to perform real-time processing to manage workloads that are dynamic. For example, relational databases should be able to work with real-time data streaming and big data (an example was presented in the unit lesson).

Scenario: eHermes wants their personnel to be able to view security video footage in real-time and provide them with the ability to query video footage for viewing. Choosing a database solution such as MongoDB would allow eHermes to store mobile self-driving video footage in the same database as the metadata.

To do this, eHermes needs a way to manage the demands of real-time data streaming for real-time analytics. Conduct some research for a NoSQL database application such as MongoDB or Cassandra that could meet this need. How would switching to a real-time database solution help eHermes remain competitive? Create a PowerPoint presentation that does the following:

  • Provides a brief introduction to IoT.
  • Presents an argument to the eHermes CEO that switching to a more dynamic database structure (NoSQL real-time database) will meet the demands of IoT.
  • Introduces some features of the database you chose, whether it is MongoDB, Cassandra, or another database.
  • Describes how switching to a more dynamic database will give eHermes a competitive advantage?

Your presentation must be a minimum of six slides, and you must use at least two academic resources. Any information from a resource used must be cited and referenced in APA format.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

As a final deliverable to the management team, create a Power Point presentation (Should 7-8 slides) that summarizes the solutions outlined in the Key

As a final deliverable to the management team, create a Power Point presentation (Should 7-8 slides) that summarizes the solutions outlined in the Key Assignment template. In addition, describe why the proposed solution is the correct method or mechanism to be implemented. Key Assignment template. Propose an appropriate network infrastructure that

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should demonstrate your understanding of professional and ethical responsibility in relation to cyber security operations and leadership. For this assignment, review your coursework  and identify artifacts that can

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled Data Breach an All-Too-Often Occurrence. After reviewing the story, conduct research online into

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled The Importance of Knowing Your Own Security Posture.  After reviewing the story, conduct

Assignment Type: Essay (any type) Service: Writing Pages/Words: 5 pages / 1375 words (Double spacing) Education Level: College Language: English (US)  Your

Assignment Type: Essay (any type) Service: Writing Pages/Words: 5 pages / 1375 words (Double spacing) Education Level: College Language: English (US)  Your Deadline: Aug 26, 08:00 PM  Assignment Topic: How to Avoid Being a Victim of Cybercrime Subject: Internet Technology (IT) Sources: 10 sources required Citation Style: APA 7th edition