Engineering, Technology & Applied Science Research Vol. 5, No. 5, 2015, 850-853 850


Engineering, Technology & Applied Science Research



Yüklə 62,01 Kb.
Pdf görüntüsü
səhifə5/5
tarix07.01.2024
ölçüsü62,01 Kb.
#209799
1   2   3   4   5
Perspectives on a Big Data Application What Databa

Engineering, Technology & Applied Science Research
Vol. 5, No. 5, 2015, 850-853
853 
www.etasr.com 
Erturk and Jyoti: Perspectives on a Big Data Application: What Database Engineers and IT Students… 
 
Fig. 6. 
NoSQL vs traditional SQL syntax.
V.
C
ONCLUSION 
In order to implement these learning activities for students, 
it is necessary for instructors to cover the theoretical content in 
depth prior to the practical work. Furthermore, the practical 
tutorials require initial familiarization, trouble-shooting, and 
self-guided technical learning. Therefore it is important that 
instructors plan and allocate time to students so that they can 
understand what they need to do, and become prepared. In later 
stages of the course, once MongoDB is installed on a server, 
students can access a cloud based MongoDB using the lab 
computers and their own computers. In the course (that this 
paper targets), about thirty enrollments are expected. These 
students will be guided by one instructor.
A recommendation for further research as well as training 
material development should be on understanding and 
improving the security of a MongoDB database. This is 
important because many MongoDB implementations have been 
done recently without setting up the correct access controls [8]. 
After the initial installation, all of the user profiles and 
authorizations have to be set up by the database administrator. 
Secondly, hackers may try to exploit MongoDB databases 
using code injections similar to the way SQL injections have 
been used to target traditional relational database applications. 
Future students who are doing additional training on MongoDB 
security should review the syntax of the possible injections, and 
learn how these injections can be prevented from posing a risk.
It needs to be emphasized that cloud computing and big 
data offer additional benefits together: capturing and analyzing 
much more information, making better business decisions, 
using the IT infrastructure more efficiently, and enhancing 
disaster recovery. However, when selecting a database product, 
it needs to be kept in mind that each company should decide 
according to its own unique data and reporting requirements. 
However, in general, capturing and providing fast access to big 
data will continue to be crucial, with ever increasing numbers 
of connected mobile applications and new online systems [9].
As emphasized in this paper, the public awareness of big 
data applications and their benefits is increasing. As a result
more companies are looking for IT professionals with the latest 
knowledge and skills in this area. These potential employers 
are not only software development companies but also include 
diverse organizations and companies from different sectors of 
the economy.
R
EFERENCES
[1]
V. Beal, “Cloud Cmputing (the Cloud)”, 
http://www.webopedia.com/TERM/C/cloud_computing.html
[2]
G. A. Tarnavsky, E. V. Vorozhtsov, “Cloud Computing in Science and 
Engineering and the “SciShop.ru” Computer Simulation Center”, 
Engineering, Technology & Applied Science Research, Vol. 1, No. 6, 
pp. 133-138, 2011 
[3]
V. Inukollu , S. Arsi1, S. Ravuri, “High Level View of Cloud Security : 
Issues and Solutions”, Fourth International Conference on Computer 
Science, Engineering and Applications, Chennai, India, pp. 51-61, 2014 
[4]
A. Shields, “Why Traditional Database Systems Fail to Support Big 
Data”, http://marketrealist.com/2014/07/traditional-database-systems-
fail-support-big-data/
[5]
Solid IT, “DB-Engines Ranking of Document Stores”, http://db-
engines.com/en/ranking/document+store
[6]
S. Khan, V. Mane, “SQL Support over MongoDB using Metadata”, 
International Journal of Scientific and Research Publications, Vol. 3, No. 
10, pp. 1-5, 2013
[7]
J. Roy, “MongoDB: Characteristics and future”, 
http://www.mongodbspain.com/en/2014/08/17/mongodb-characteristics-
future
[8]
J. Heyens, K. Greshake, E. Petryka, “MongoDB Databases at Risk: 
Several Thousand MongoDBs without Access Control on the Internet”, 
Saarland University Center for IT Security, Privacy, and Accountability, 
https://cispa.saarland/wp-content/uploads/2015/02/MongoDB_document 
ation.pdf
[9]
E. Erturk, “An Intelligent and Object-oriented Blueprint for a Mobile 
Learning Institute Information System”, International Journal for 
Infonomics, Vol. 6, No. 3/4, pp. 736-743, 2013
[10]

Yüklə 62,01 Kb.

Dostları ilə paylaş:
1   2   3   4   5




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin