Verified Document

Management Systems Appendix A Project Research Proposal

Security will be discussed later in this analysis. The second factor used to evaluate closed source vs. open source DBMS are the application development environments that each has. Closed source vendors have turned application development environments into revenue-producing lines of business (Worthen, Kiviniemi, 2009). As a result, closed database vendors have a slight edge in the areas of application development. There are also the initiatives of Service Oriented Architectures (SOA) and distributed application use by closed database vendors Microsoft and Oracle. The integration and use of application development is also a key catalyst for closed source vendors to ensure their maintenance fees can also be sustained over time (Hyatt, 2008). Open source DBMS vendors and providers have benefitted from the broad community of developers, yet it is not as focused on profitability as the primary goal; it is focused on breadth of OLTP engine support and Application Programming Interfaces (API) to ensure broad adoption (Ricadela, 2009). The pervasiveness of these open source extensions rivals closed yet, yet the latter is more aligned and attuned to supporting maintenance cycles and contract management of customers' contracts. In fact the reliance on contract management and the recurring revenue model of closed source DBMS vendors is the primary source of their most profitable revenue over time (Denton, Peace, 2003). This factor is the catalyst for their heavy levels of investment in application development environments and platforms on the part of Microsoft and Oracle especially. Oracle's Fusion initiative is an SOA platform that integrates role-based applications published as Web Services over an XML network (Spanbauer, 2008). Microsoft's .NET architecture is also specifically designed to provide for scalable and role-based Web Services across non-Microsoft systems. Fusion and .NET are the closed source DBMS vendors' approaches to creating a role-based business process management (BPM) platform. Due to these factors, application development is considered more enterprise in scope for closed source vendors.

Database security as a criterion for evaluating the closed source vs. open source vendors in this analysis illustrates how effective innovation of a DBMS can be when there are high levels of collaboration in a user community. Microsoft and Oracle both have defined role separation, reporting and data availability as part of their security models (Pereira, Muppavarapu, Chung, 2006) from a closed database standpoint. Yet the open source vendors included in this analysis have a more thorough interpretation of the three pillars of an effective security strategy (Kamel, 2009). These three pillars include creating a more consistent and uniform approach to path management and discovery & classification of risks, the development of consistent preventative measures for encryption, data masking and change management as well. Lastly and most significant is the need for defining intrusion detection, auditing, monitoring and vulnerability assessment (Kamel, 2009). Taken together these are the factors that define a scalable security strategy over time. On the first area of path management and discovery & classification, open source vendors have devised authentication and authorization logic to the role level for the DBMS platforms, while close source vendors rely on ancillary security applications for this (Kamel, 2009). Just as the basic licensing model of open source DBMS lends itself better to TCO advantages, this integration of security into the foundation of an open source DBMS provides a significant cost advantage (Spanbauer, 2008). The second aspect of security platform differences between open source and closed source are the preventative measures taken to provide higher levels of encryption while reducing the risk of data masking. All of these factors are critical for change management to be more effectively managed at the database, process and organizational levels (Kamel, 2009). Appendix C: Open Source Security Tools provides examples of the level of innovation being achieved in the development of security (Hyatt, 2008). The last column or tier of an enterprise-wide DBMS security strategy is the development of auditing, monitoring and threat assessment methodologies (Iyer, 2009). In this specific area Microsoft SQL Server 2008 and oracle 11g have defined scripts that can automate the auditing process and also launch audits of each database entry points randomly to test the scalability of security over time (Kamel, 2009). Audit data is then analyzed and provided within a dashboard that Data Base Administrators (DBAs) use to evaluate overall security and ACID-compliance as is seen in Table 1: DMBS Features Analysis. Using the series of analyses (Iyer, 2009) (Kamel, 2009) Table 2: Three Pillars of Enterprise Database Security illustrates how the three specific pillars of security interrelate and support role separation, reporting...

Across this three pillars mode open source DMBS data structures have been shown to provide a greater level of data integration and support (Iyer, 2009).
Figure 2 Three Pillars of Security

Sources: (Iyer, 2009) (Kamel, 2009) (Giacomo, 2005) (Pereira, Muppavarapu, Chung, 2006) (Ramsey, 2003)

The next two criterion that are used to evaluate closed source and open source DBMS systems is the direction of the product strategies, commitment to a given architectural direction and the differing strategies in pricing. Across these three factors, the most prevalent in terms of its impact on the industry is the open source model of pricing to a single license and not necessarily requiring maintenance and service contracts as closed source DBMS providers often require in order to get software updates. Maintenance charges for Oracle and Microsoft are often up to 22% of the purchase price of the application, translating into millions of dollars per year in just support costs (Kamel, 2009). Due to this fact closed source DBMS are often part of Capital Expense (CAPEX) budgeting within a company (Iyer, 2009). CAPEX investments by definition need to go in front of the Board of Directors for approval. This significantly slows down adoption. The use of Operating Expense (OPEX) pricing strategies by open source DBMS vendors has led to significant market share gains over time and higher levels of adoption. The economics of this pricing strategy has also had a signification effect on open source DBMS vendor's financials (Pereira, Muppavarapu, Chung, 2006) (Spanbauer, 2008). As a result of the ability to expense investments in open source DBMS, the financial strength of companies including MySQL, as a division of Oracle now due to the acquisition, are superior to closed source vendors. CAPEX requires a longer sales cycle and more focus on the Return on Investment (ROI) of the investment in the DBMS.

Another factor in the evaluation of closed source vs. open source DBMS providers is in the area of training & certification, and systems integrator and partner support. The development of channel programs for DBMS platforms is more dependent on the stability of the selling strategies and less on the specific features of the product. Oracle has at times reversed their partner & channel management strategies leaving resellers without support while having to provide technical assistance on key DBMS updates. The results on Oracle's ability to support their channels and recruit new ones have been predictable; they have a tough challenge to overcome. Open source DBMS vendors on the other hand have been successful in creating channels by concentrating on the customization revenue opportunities for channel partners.

Conclusions

Based on the assessment of performance, scalability, and VLDB functionality, application development environments, database security and platform support, open source platforms are gaining significantly both technologically and also from a market adoption standpoint vs. closed source. These advances specifically in optimized XML networks for AJAX-based queries has led to the development of role-based applications that put the performance and functionality of MySQL in the same level of performance as Oracle 11g or Microsoft SQL Server 2008 (Pereira, Muppavarapu, Chung, 2006). Open source platforms have also defined more extensive 3rd party and legacy DBMS integration as is shown in Appendix A: Project Process Integration Diagram and Appendix B: Project Process Flow Chart. These are examples of network topologies that have been optimized fro the role of open source in a more generic level in Appendix A and a detailed, application-level integration in Appendix B. This analysis has centered on the design considerations of open source vs. closed source databases, pricing strategies that pursue OPEX instead of CAPEX and the structure model of security that emerges from this market. All of this analysis suggests that open source MySQL databases are superior in performance and TCO relative to their closed source counterparts. The further implication is that open source will scale to respond the rapid changes in the market much faster as well (Hyatt, 2008).

Recommendations

The following are the recommendations based on the results of this report's analysis. First, from an assessment of the performance, scalability and VLDB functionality of IngreSQL and MySQL relative to Microsoft SQL Server 2008 and Oracle 11g, the scalability factors relating to open source show MySQL to be superior at scaling for OLTP transactions and Web Services (Pereira, Muppavarapu, Chung, 2006). In addition the analysis of the application development environments of open source vs. closed source show that while Oracle has Fusion and Microsoft has .NET, there is a more diverse and less costly application development environment on MySQL. The use…

Sources used in this document:
References

James W. Denton, & A Graham Peace. (2003). Selection and Use of MySQL in a Database Management Course. Journal of Information Systems Education, 14(4), 401-407.

Giacomo, M. (2005). MySQL: Lessons Learned on a Digital Library. IEEE Software, 22(3), 10-13.

Doug Goans, Guy Leach, & Teri M. Vogel. (2006). Beyond HTML: Developing and re-imagining library web guides in a content management system. Library Hi Tech, 24(1), 29-53.

Hyatt, J. (2008). The Oh-So-Practical Magic of Open-Source Innovation. MIT Sloan Management Review, 50(1), 15-19.
Cite this Document:
Copy Bibliography Citation

Related Documents

Management Distributed Order Management Systems
Words: 4856 Length: 11 Document Type: Term Paper

AMR Research (2005) believes that companies must begin developing and redeploying current order management architectures with the focus on delivering more flexibility rather than a strategy that delivers far less. The move toward customer-driven fulfillment processes requires the ability to build and adapt channel-specific, product-specific, and customer-specific order flows quickly without an army of developers creating custom code. However, the days of big bang, rip-and-replace implementations are over, and any

Forest Fire Management Systems and
Words: 17324 Length: 63 Document Type: Term Paper

It was then important to see the degree at which technology and training played a role in combating each fire. 1.2.4.Rationale of the Study What is that can be gained from this study? The reasoning behind such a study is born out of a need to provide better training for fire fighters so that fire management systems will improve and reduce the amount of loss due to the fire. By studying

Strategic Management Systems to Increase
Words: 5523 Length: 15 Document Type: Thesis

Second, the data will be analyzed using the software application, Statistical Package for the Social Sciences (SPSS) for Windows, Version 13. Statistical measures of correlation of it spending, including controlling for early adoption of SOA platforms, will be entered into the analysis. Finally, the results will be analyzed and recommendations made on specific strategies for attaining higher levels of efficiency in both patient care and operational contexts based on

New Inventory Management System
Words: 4444 Length: 15 Document Type: Business Plan

Request for Proposal (RFP) � Inventory Control SystemTABLE OF CONTENTS1. INSTRUCTIONS TO BIDDERS ��..�������������������� 31.1 General Description of Work ��������������������.. 31.2 What Must Be Included with Bid ������������������� 31.3 Schedule of Bid Period Activities ������������������.. 41.4 Location of Work �������������������������.. 41.5 Pre-Bid Meeting �������������������������� 51.6 Owner Contact for Questions ��������������������. 51.7 Pre-Award Surveys ������������������������.. 51.8 Sealed Bid Requirements ���������������������... 61.9 Basis for Bid Evaluation ����������������������.. 61.10 Ethical Standards ������������������������.. 71.11

Project Management Plan
Words: 2954 Length: 11 Document Type: Research Paper

Project Management Plan of a New Restaurant This project management plan is majorly concerned primarily with the first two steps which are defining the project; the project objective is broken down into a series of manageable steps called tasks and designing the project process; this work is performed by the project manager and is presented in the GANTT chart where the tasks are displayed in more detail (Hamilton, 2004). Besides, for

Project Management Assessing the Role
Words: 2543 Length: 6 Document Type: Thesis

The use of Gantt charts for enabling interprocess integration and knowledge management in the A&D industry is a best practice for also managing process-intensive projects (Singh, Keil, Kasi, 2009). These include the development of new computer systems and advanced technologies where the project needs to capture the knowledge to fulfill its objectives. Project management's core set of tools therefore needs to be focused on how to augment and strengthen

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now