Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

CASE 4 – 40

i need help please

Module 4 – Case

Database Systems and Knowledge Base

Assignment Overview

The Case Assignment for this module considers the emerging and important trend toward what is called “open-source software.” The Background Information contains material regarding this movement; its effect is being felt in many different areas of information technology, both operating systems and applications. The area of database management has long been dominated by large-scale applications from companies such as SAP and Oracle. Under these conditions, you either buy the entire suite, which commits you to a single approach and offers you in return a single interface, or you buy nothing. Open-source software allows firms and new startups with little funding—especially those in emerging economies in Africa and Central America—to have access to software to improve their business operations.

The open-source movement has been a breath of fresh air in many areas of computer systems development, not just databases. The idea is fairly simple if somewhat counterintuitive: Give away your product to make money. The odd part is, it works, at least part of the time. What it amounts to is that by making the core source code of major applications common knowledge, you encourage people to build on that, and the more applications and specific tools people build on it, the more you have the opportunity to create a critical mass of users and uses of that software. The Unix operating system pioneered the approach and had become dominant in middle ware systems.

In this module, we look at the issue of open-source applications in database management.

MySql has become a dominate open-source database and there are others. Companies such as Oracle and SAP bundle their database software with Enterprise software to fund the business. However, Enterprise software is moving to open source and on the cloud such as ERPNext.

Since companies are moving in this direction, open-source warrants attention, particularly in developing countries in Africa and Central America and business startups with little cash. Open source can enable diverse business owners to have access to the open-source tools they need to run their business.

Case Assignment

After reviewing the module materials, please write a short (3- to 5-page) paper discussing the question:

Why is open-source software dominating database management tools in developing countries such as Africa and Central America? What benefits do open-source database tools bring to these diverse business owners? Do you also see this shift to open-source in the other parts of the world as well? Can a large company run its infrastructure with an open-source database?

Your paper should be between three and five pages. Take a definite stand on the issues to develop your supporting argument carefully. Using material from the background information and any other sources you can find to support specific points in your argument is highly recommended; avoid making assertions for which you can find no support other than your own opinion.

Your paper is to be structured as a point/counterpoint argument, in the following manner:

· Begin the paper by stating your position on the questions clearly and concisely.

· Citing appropriate sources, present the reasons why you take this position. Be sure to make the most effective case you can.

· Then present the best evidence you can—again citing appropriate sources—
against your position; that is, establish what counterarguments can be made to your original position.

· Finally, review your original position in light of the counterarguments, showing how they are inadequate to rebut your original statement.

By the end of your paper, you should be able to unequivocally reaffirm your original position.

Assignment Expectations

Length: Follow the number of pages required in the assignment excluding cover page and references. Each page should have about 300 words.

Your assignment will be evaluated based on the Rubric.

You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use Trident’s 

Introduction to APA
 guide for proper formatting and style.

Module 4 – Resources

Database Systems and Knowledge Base

Required Reading

Reading Chapters 1 and 2 in:
Chakraborty, M., & Kundan. A. P. (2021). 
Monitoring cloud-native applications: Lead Agile operations confidentially using open source software. Apress. Available in the Trident Online Library. [See 

Finding Skillsoft Materials
.]  

Chapters 1-3 in:
Haff, G. (2021). 
How open source ate software: Understand the open source movement and so much more (2nd ed.). Apress. [See 

Finding Skillsoft Materials
.]


Protecting Your Network with Open Source Software
 from LinkedIn Learning


Agile Foundations
 from LinkedIn Learning

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

3

See attached. In 2001, lone wolf terrorist and bioweapons expert Dr. Bruce Ivins, mailed several United States Postal Services (USPS) letters and parcels filed with anthrax spores to news media outlets, democratic senators, and others. This terrorist incident was considered a weapon of mass destruction (WMD) attack, as anthrax is

II

see attached. The United States homeland security enterprise is intentionally decentralized, relying on a complex interplay between federal and state agencies, local authorities, and community stakeholders. The National Incident Management System (NIMS), the National Response Framework (NRF), and the whole-community approach are designed to create integration and interoperability but not

Data Collection Methods

  Think of your favorite human-computer interaction. Perhaps it was with Alexa, a video game, or something as simple as a TV remote. What made the experience so rewarding? Were the sounds authentic, visuals realistic, feedback precise? Was it intense, relaxing, motivating, or curiosity-inspiring? Discuss your experience and how designers

OS and Hardware Selection

  Preparation There is no specific methodology for choosing software and hardware for an application. Sometimes, it is self-evident, and other times, there may be choices or options. In any case, they must be specified. As you choose your pairing, you might consider the following: The app’s primary purpose –

Emotion and Social Components of Design

  Some things are designed to impact emotions, such as advertising and movies. Others might be more focused on social aspects of design, such as an amusement park or social media site. Share a design that has moved you emotionally and socially. Discuss its impact on you and why it

VIII

see attached. Considering the critical importance of effective communication during a disaster, discuss the challenges and solutions related to ensuring interoperability among different communication systems used by various emergency response agencies. How can these agencies overcome technological and organizational barriers to maintain seamless communication during a crisis. Your journal entry

SWOT analysis

Concepts and Applications of Information Technology (IFSM201) Class Project Purpose of this Assignment The Class Project is the most significant assignment in this course, Concepts and Applications of Information Technology. As such, it accounts for 58% of the course points. This assignment is comprised of two deliverables; a SWOT Analysis

Present now part 2

Research network forensics  please see attached documents for further details  [removed]

Business of IT – Application

 Soleil Panel Distribution, a solar panel company, has been in business for 25 years. For the first two decades, they focused primarily on distributing small panels used in personal electronic devices, such as calculators and watches. As solar-powered technology has developed more, the company is seeing unprecedented growth. They have

VII

see attached. For your project, you will assume the information below. You are employed in an emergency management function in your local community. The act of terror takes place in your community with little to no warning. There are mass casualties and damage to local infrastructure. Your plan must address

VIII MIS Journal

See attached Unit VIII PowerPoint Presentation Reflect on how you can apply the concepts learned in this course in your future professional, personal, or academic pursuits. Given the ubiquity of global corporations in the current economy, reflect on the following: · Discuss how electronic commerce provides competitive advantages. · Examine

VPN Management Techniques

  VPNs are available both commercially and as open source. Research the VPN solution of two IT solutions vendors. Be prepared to discuss both types. Discuss which solution you would recommend for a small business, and why. Explain each of the following VPN implementations: DMZ-based, bypass deployment, and internally connected

V

see attached. It has been said that the question of defining terrorism is irresolvable. There is disagreement regarding whether to define it in terms of its methods, aims, or both. The international community has never succeeded in developing an accepted comprehensive definition of terrorism. Even within the various federal agencies

PPT VII

See attached Unit VI PowerPoint Presentation Harnessing the Power of AI for Strategic Decision- Making: Opportunities and Challenges The objective of this assignment is to understand and analyze the role of artificial intelligence (AI), business intelligence (BI), and business analytics (BA) in enhancing organizational decision-making processes, while also considering the

PPT VII

See attached Unit VII PowerPoint Presentation It is important to understand what information systems are and why they are essential for running and managing a business. The case studies below will provide you with an opportunity to review many of the concepts covered in this course thus far. These case

IV

see attached. Discuss the importance of unified interagency operations to ensure emergency responder safety and public safety during a terrorist attack response. What do you think is the biggest challenge facing a multiagency response when it comes to implementing protective measures at the scene of a terrorist attack? Explain your

Unit V DB

See attached DB Unit V • Your initial post should be at least 300 words in length. • Your initial post should include at least one APA-formatted scholarly, professional, or textbook reference with accompanying in-text citation to support any paraphrased, summarized, or quoted material. You are the owner of a

Policy Politics

Assignment: Multimedia Keynote Presentation Objective: to evaluate the student’s knowledge of being politically competent as a health care leader and to build his or her online presentation skills You are a senior health care leader working at a prominent hospital in Chicago. You have been asked to speak at the