Literature review

Daily companies based on information technology are facing a lot of issues and computing challenges due to the data management. There is the wide usage of cloud and mobility, and it is opening up new opportunities for that information technology companies to be more service centric and productive. The database is the hidden workhorse that many businesses’ IT systems, storing critical business intelligence and bearing out hundreds to thousand so transactions each day (Cheung et al., 1996). Many companies are storing their information on relational databases, and they anticipate taking advantage of the emerging technologies such as XML or object-based databases. Instead to discarding the previous RDB or building non-relational data on it, it becomes better to convert the old data and applications onto a new environment (Maatuk et al., 2008). However, the question that remains is which of the databases is the most appropriate to migrate? That is the reason there is a need for an integrated method that handles database migration for it to be a success.

The method of migration needs to assist in the selection of the most suitable databases when comparing the databases that are available in the market. It should allow the development of the required applications to provide the required functionality and high performance than the previous one (Vitthal et al., 2013). A canonical model can be useful in the intermediate stage of data conversion and schema from the input database to the various output targets. Many researchers have been researching on the database migrations while focusing on different areas. There are many assumptions in most of the literature that restrict the successful migration. For the migration to a new database to be successful, there is a need for further normalization to third normal form (Premerlani & Blaha, 1994). Many of the literature assume key-based conclusion dependency with key attribute consistencies while another assumption is that the design often initial schema is okay. In Kronsys, the migration has to take place seamlessly, and I will have to ensure the application of the best methodology while working with the company’s database managers and data administrators.

In that research, I will prefer the application of an integrated method for database migration that can preserve the semantics and structure of an existing relational database to generate ORDB/XML schemas. The method also provides an effective way of loading data into the target databases without the loss of unnecessary redundancies. The method is superior to many of the approaches proposed in many kinds of literature, and it leads to three types of databases including an object-oriented, relational database, and XML schema. The method also helps to exploit excellent feature provide to the target outputs. Because there is heterogeneity among the three data models provided as outputs, the method makes it possible to develop a canonical data model (Callan, 2006). That canonical data model is useful in bridging the semantic gap that exists between those data models and consequently facilitate the migration process. The canonical data model does preserve and enhance the target database’s integrity y constraints as well as the data semantics that fit in with the target database characteristics.

The integrated method will consist of three phases including semantic enrichment, schema conversion and data conversion (Maatuk et al., 008). The first phase produces a canonical data model that contains much of the relational database’s constraints and data semantics that did not have an explicit expression in it. There is then the mapping of the canonical data model obtained into the target schemas of the second phase. The third phase is where the conversion of the relational database data into its equivalent in the new database takes place. There should be early designing of the system architecture and implementing a prototype to demonstrate that process that should show the success of the whole process before the actual migration takes place. In a nutshell, the integrated database migration project should entail three phases including semantic enrichment, schema translation, and the data conversion (Topor & Tanaka, 1997).

The semantic enrichment of database migration is where the analysis of the RDB to understand its meaning and structure takes place. That means you make the hidden semantics explicit. For Kronsys, the semantics enrichment phase will involve the extraction of data semantics from the old database and then representing in relational schema format. After that, there will be the conversion of the data into a much enriched canonical model. The schema translation will involve the translation of the canonical model produced in the previous phase into its equivalent target schema (Maatuk et al., 2007). There is following of the necessary rules during the translation that are not in the scope of this paper. The data conversion as the last phase will entail the conversion of the existing database data onto the format required by the target schema. Te canonical data model created in the previous phase is useful in guiding the conversion process.

Proposal
The paper focuses on tracking the internship at Kronsys Inc. in database migration so as to ensure that the migration process takes place seamlessly, and there is no disruption of the business processes. During my internship, I will ensure that the migration task goes on according to the requirements of the business. I will also be in the requirement to explore various modules of the new database and integrate them to benefit the company business operations. While carrying out an internship in database migration at Kronsys Inc, the internship consists of various phases like orientation, training, gathering or understanding requirements, and testing and implements the changes. These phases have explanation below through iterations.

Iteration 1 Orientation
The orientation session helps in understanding the company and their culture. During orientation at Kronsys Inc., the primary goal will be to explore the company and understand its vision and the mission statement. I will also have a good understanding of the focus and key players of the company.

Iteration 2 Training
In this phase, Training on the database migration essentials and operations will have an explanation so as to understand clearly my role in the entire process. During training, there will be a brief introduction to the ethics and standards of the organization plus the provision of real time examples to work on before actually project assignment.

Iteration 3 gathering requirements
After the training, I will analyze the project and obtain a proper understanding of the requirements. There will be the understanding of the project and requirements for the changes through the data gathering process and after analyzing the requirements, I will identify changes and perform analysis on the proposed changes. Later in this phase, there will be making a decision on the changes and obtaining of approvals.

Iteration 4 Test and Implementation
In this phase, there will be finalizing of the database changes and applying them to the existing system and then proper testing of the new database will follow to check the functionality is working properly. The testing will also serve the purpose of finding out if other services are effective because of the change implemented.

How to start Your Career in Software Testing

In the expansive realm of software development, the role of a software tester is crucial. These professionals ensure that software applications are functioning correctly, meeting quality standards, and are free from glitches and errors before they are released to the end-users. If you’re considering delving into the world of software testing, you’re stepping into a field that’s in high demand and offers a promising career path. Here’s a comprehensive guide on how to embark on your journey and establish a successful career in software testing.

Understanding the Basics of Software Testing:
It’s crucial to understand the foundations of software testing before launching into a career in this field. Software testing involves examining software applications to detect defects or malfunctions. Testers analyze software requirements, design test cases, execute tests, and report defects. They play a pivotal role in ensuring the reliability, functionality, and performance of software products.

Acquiring the Necessary Skills:
To excel in software testing, you’ll need to develop a diverse set of skills. These include:

Analytical Skills: Testers need to be highly analytical in order to break down complicated software systems, spot possible problems, and create efficient testing plans.
Technical Proficiency: A solid understanding of programming languages, databases, and testing tools is indispensable for software testers. Proficiency in tools like Selenium, JIRA, and TestRail can significantly enhance your testing capabilities.
Attention to Detail: Software testing demands meticulous attention to detail to uncover even the most subtle defects. Testers must possess a keen eye for spotting anomalies and inconsistencies within software applications.
Communication Skills: Effective communication is essential for conveying test results, collaborating with development teams, and articulating technical concepts to non-technical stakeholders.
Problem-Solving Abilities: Testers encounter various challenges during the testing process. The ability to troubleshoot issues, think critically, and devise innovative solutions is invaluable in this field.
Educational Pathways:
A career in software testing may not always require a formal degree, but obtaining the necessary academic credentials can increase your employability and give you a strong foundation. Take into consideration enrolling in quality assurance, software engineering, or computer science degree programs or certification courses. Additionally, you can acquire the skills and information required to succeed in this area by enrolling in specific courses in software testing methodologies and tools. Comprehensive programs designed to satisfy industry demands are offered by Software Testing Training in Delhi, Noida, Agra, Vadodara, Mumbai, and many other Indian cities. These programs give participants practical experience and insights into the newest trends and approaches.

Gaining Practical Experience:
Practical experience is crucial when working in the software testing industry. Seek internships, co-op programs, or entry-level positions to gain practical exposure to testing methodologies, tools, and industry practices. Embrace every opportunity to work on real-world projects, collaborate with experienced testers, and hone your skills in test planning, execution, and reporting.

Building a Strong Portfolio:
As you gain experience in software testing, compile a portfolio showcasing your projects, achievements, and contributions. Include details about the types of testing you’ve performed, the tools and methodologies you’ve utilized, and the impact of your testing efforts on software quality. A well-curated portfolio serves as tangible evidence of your capabilities and can significantly bolster your job prospects.

Networking and Professional Development:
Networking plays a vital role in advancing your career in software testing. Join industry forums, attend conferences, and connect with seasoned professionals in the field. Engage in knowledge-sharing activities, participate in discussions, and stay abreast of the latest trends and developments in software testing. Additionally, consider obtaining certifications such as ISTQB (International Software Testing Qualifications Board) to demonstrate your expertise and commitment to professional growth.

Job Search Strategies:
When embarking on your job search in software testing, cast a wide net and explore diverse employment opportunities. Look for openings in software development companies, IT consulting firms, quality assurance departments, and software testing service providers. Tailor your resume to highlight your relevant skills and experiences, and customize your cover letter for each application to demonstrate your enthusiasm and fit for the role.

Continual Learning and Adaptation:
The field of software testing is dynamic and constantly evolving. Embrace a mindset of continual learning and adaptation to stay relevant in the industry. Keep abreast of emerging technologies, testing methodologies, and industry best practices. Pursue advanced certifications, attend workshops, and engage in online courses to expand your knowledge and skill set.

Conclusion:
Embarking on a career in software testing offers a wealth of opportunities for growth, learning, and professional fulfillment. By acquiring the necessary skills, gaining practical experience, building a strong portfolio, and networking with industry peers, you can pave the way for a successful and rewarding career in this dynamic field. Remember to stay curious, embrace challenges, and remain dedicated to honing your craft as a software tester. With perseverance and determination, you can embark on a fulfilling journey towards becoming a seasoned and sought-after testing professional.

Analysis of the global risks and threats to today’s businesses

Introduction
The present business world has many underlying risks and threats that require practical risk management strategies to handle. Businesses have a major role in ensuring that their operations are not under threat from the increasing risks. The hackers, cyber criminals, and other fraudsters are persistently looking for ways of stealing the corporate data for ulterior motives. Corporate organizations have the different genre of information including personal data for their clients and customers, their health care data, financial records, and other sensitive information. As such, the increased data breaches, cyber security risks, and vulnerability make business have determination in developing countermeasures to protect their valuable assets. The business has an objective of minimizing the impact of both the known and the unknown threats. The paper provides an analysis of the risks and threats faced by businesses today and also the effective strategies for handling them.

Common Risks and Threats
A Risk is a likelihood of an attack being successful due to exposure to a given threat. Risk analysis focuses on determining the most important potential security breaches and addressing them. Risk analysis for business helps to establish the appropriate security budgeting to address the issues.

Threats are the source and means of attack. An assessment of the threats helps to determine the best approaches to securing a system from attack. The major focus of threat analysis is to assess the attacker’s resources. It is different to risk assessment in which it focuses on analyzing the potential of an organization’s resources falling prey to attacks.

The span of the period between 2013 and 2014 saw a rise in data breaches targeting global companies. IT security is no longer a mere concern but a global news story. There are numerous data leaks, corporate espionage, and cyber crimes that negatively impact the face of IT security in the organizations. The cyber risks are evolving rapidly and in many areas. The targets of the cyber-criminals continue to increase with the latest being governments and big companies. The main focus of targeting the governments is to undermine the national security and infrastructure. Many businesses have challenges in maintaining their reputation online following the many data breaches. The impact of risks and threats facing organizations and governments lies in the economy in which there is a likelihood of digital disintegration. Cyberspace has immense potential if well utilized, but the strengthening of the attacks will undermine the underlying potential.

Most of the risks and threats target the security of the information stored in the databases. It calls for new regulatory requirements in changing how to handle the security functions. The confidentiality, integrity, and reliability of data are an important aspect that every business should uphold. The exposure of data and sensitive information to fraudsters renders the organization vulnerable to data breaches. It is necessary to comply with the emerging regulations on data privacy and other controls that ensure that organizations maintain data security. Threats are difficult to control, but businesses can minimize their impact by working on particular effective strategies. On the contrary, businesses can manage the risks to reduce their vulnerability and the overall impact (Viney, 2011).

The common high-risk security threats to businesses are network norms that attack through phishing emails and some downloads. The business can be liable to data sniffing from its network if it’s open. The internet hackers and other cyber criminals attack the networks that lack proper security measures (Jahankhani, Fernando & Nkhoma, 2009).

Businesses face increased risks to data security due to the proliferation of their networks by widespread use of mobile devices in handling business operations. At present, many organizations have the BYOD policy. The policy allows the staff to carry their devices to work and access the company data on them. As such, the security of the data remains at stake since the company cannot control the device. Many fraudsters and hackers understand the potential that the devices have in cyberspace and thus device dubious ways of attacking them. The risks and threats that face businesses require practical risk management strategies to handle (Axelrod, Bayuk & Schutzer, 2009).

Strategies to deal with the evolving business threats
The presence of disgruntled employees in the IT department is likely to cause internal attacks to the data and the system. Most of the rogue employees can have access to the network, data centers, and the administrator accounts and cause serious damage. The mitigation to the issue is identifying all the liable accounts and credentials that are under threat and terminate them. Internal attacks from employees are the major threats that affect organizations since the employees have access to sensitive details about the organization. Thus, the termination of their privileged credentials of the internal staff helps to prevent attacks (Cole & Ring, 2006).

Data thefts is a high vulnerability issue when employees use their mobile devices to share data, access the company information, and fail to change their passwords. Many companies that allow BYOD face the risk of exposure on the corporate network if a malware application or software installs on the devices. The solution to the problem has policies that address the BYOD issue. The BYOD policy allows the employees to acquire knowledge on the proper management of their devices and also the company expectations (Partow-Navid & Slusky, 2008). The policy also allows monitoring of the emails and documents downloaded to the company through the devices. The monitoring measures in place provide the companies with visibility in mobile related data loss risks (Axelrod, Bayuk & Schutzer, 2009).

The other strategy is patching applications. Most of the applications used on the core operating system have unique patching methods and requirements. It is essential to have them on a single process. Many cyber intrusions occur through applications. However, many organizations do not patch the common applications in use rendering them liable to attack (Viney, 2011). The scenario increases the attack surface of the system and other systems sharing the network due to un-patching the applications. The malicious network attackers often take advantage of the vulnerabilities in the applications for them to gain easy access to the network. The organizations should use updated software that has increased protection against the malicious attacks.

Another strategy involves securing a network and accounts with strong and encrypted passwords that are difficult to encode by an attacker. The method ensures that any malicious activities on a network do not lead to a successful attack. The passwords should also have a review and update within scheduled periods. Encryption is a safe way of minimizing the effects of a risk and threat since the hackers do not have access to the vital data and information.

Conclusion
Businesses are under threat and also face many risks in conducting their operations effectively. They face threats in data security that renders them vulnerable to attack by fraudsters, hackers, and cybercriminals. The hackers and cyber criminals devise different methods of ensuring that they have access to the vital corporate information. However, a business with proper strategies in handling the risks and threats reduces the underlying negative impacts. The effective and practical strategies discussed include encryption, use of patch management on the applications, and avoiding internal attacks by rogue employees