Smart Homes, Inc. Case Study Case Study

Database Distribution Strategy Smart Homes, Inc. required a database distribution strategy for its exciting new home thermostat product. As part of initiatives to develop and establish this database, the firm has created its own Web-based system for registering, evaluation, and controlling a user's thermostat through a mobile computing device. The database design must support a smart thermostat registration system that would support some customer service processes. For instance, when a customer installs and powers on the smart thermostat, the device links to his/her home network and sends distinctive device and environment information to the Smart Home, Inc. system. Moreover, the database must support the collection of smart thermostat data like current temperature, energy usage, humidity, thermostat location, and user-programmed temperature schedule.

Distributed Database Infrastructure

This project is geared toward the development and implementation of a thermostat system that will facilitate many functions provided by Smart Homes, Inc. As part of achieving company objectives, it will not be a simple thermostat but a complex one in which users can connect to a local network through an Ethernet interface (Landoni, 2011). The thermostat will effectively support various functions such as energy usage, humidity, current temperature, thermostat location, and user-programmed temperature schedule. User-programmed temperature schedules will be measured at regular intervals through firmware and the state of the boiler.

The three major components of the distributed database are registration, monitoring, and controlling a user's thermostat through a mobile computing device. The user registration system contains various devices that enable users be registered using a single customer account and establish customer Smart Thermostat account. The account will provide them with System Identification Number and necessary units through which confidential personal customer information is transferred. The sensitive personal information will be kept private through the company's privacy policy. The...

...

For authentication purposes, the user's registration information will be uploaded every 12 hours as each device error is recorded and uploaded to promote product satisfaction and development.
Controlling a user's thermostat through a mobile computing system will be carried out in the remote connection system. In this case, customers or users will have the option to remotely control Smart Thermostat using their mobile devices. This process will involve provision of a visual representation of every process for the users to better understand the functionality of the system. Moreover, the control process will entail validating user information, providing connection between the user's mobile device and thermostat, and checking activity. If the validation processes, shows that customer or user information is invalid, the user will be automatically disconnection or no link will be established between mobile device and thermostat.

Implementing Distributed Database

This thermostat system for the company is a distributed system that comprises hardware and software components that are critical for the functionality of the system. Generally, a distributed database system consist hardware and software components that are not all linked to a common processing unit though it is controlled by a distributed database management system. These databases are commonly used for applications where data and access are intrinsically distributed (Bhargava, n.d.). For Smart Homes Inc., the implementation of this system requires performance of various steps including developing and implementing components that meet the minimum standards in relation to network and data security. This will be followed by establishing crucial links between marketing, operations, IT, and legal departments. Information technology should be aligned with the entire business operations and organizational departments. The company should also develop an organizational…

Sources Used in Documents:

References:

Bhargava, B. (n.d.). Building Distributed Database Systems. Retrieved from Purdue University

website: https://www.cs.purdue.edu/homes/bb/cs542-06Spr-bb/building.pdf

Coy, S.P. (1996). Security Implications of the Choice of Distributed Database Management

System Model: Relational vs. Object-Oriented. Retrieved from National Institute of Standards and Technology website: http://csrc.nist.gov/nissc/1996/papers/NISSC96/paper072_073_074/SCO_.PDF
Landoni, B. (2011, May 4). Web Thermostat with Arduino. Retrieved September 14, 2014, from http://www.open-electronics.org/web-thermostat-with-arduino/2/


Cite this Document:

"Smart Homes Inc Case Study" (2014, September 14) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/smart-homes-inc-case-study-191770

"Smart Homes Inc Case Study" 14 September 2014. Web.26 April. 2024. <
https://www.paperdue.com/essay/smart-homes-inc-case-study-191770>

"Smart Homes Inc Case Study", 14 September 2014, Accessed.26 April. 2024,
https://www.paperdue.com/essay/smart-homes-inc-case-study-191770

Related Documents

Project Management: Case Study in Managing a Complex Shipyard Project in Singapore Background of Complex Shipyard Construction Project Company background Project Overview and Objective Work Process of Building Construction Issue Analysis in Shipyard Construction Project Management Literature Review of Project Management Issues in Scope Management Methodology of Scope Management Lessons Learned from Scope Management Issues in Cost Management Methodology of Cost Management Lessons Learned from Cost Management Issues in Human Resources Methodology of HR Management Lessons Learned from Human Resource Management Case Study in Managing a

Employee Satisfaction And Productivity employee satisfaction and productivity ASTRACT Employee satisfaction directly links to organizational excellence and/or productivity. Maybe… Maybe not… Researchers regularly debate exactly what components contributing to employee satisfaction and the company's and/or organization's productivity. Similarly, employers and employees do not typically agree on the reason/s an employee stays committed to a company or what factors contribute to an employee's satisfaction with the company. During the mixed-method case study, the researcher focuses

The problem is that the people who are in charge of these activities are not very good at what they do. They are simply being outcompeted by other individuals in other organizations. The Nadler-Tushman Congruence Model implies that when there is a high level of congruence between the activities at the individual, group and organizational levels, the company should succeed. Palm is an interesting case study because it counters the

Behavioral Finance and Human Interaction a Study of the Decision-Making Processes Impacting Financial Markets Understanding the Stock Market Contrasting Financial Theories Flaws of the Efficient Market Hypothesis Financial Bubbles and Chaos The stock market's dominant theory, the efficient market hypothesis (EMH) has been greatly criticized recently for its failure to account for human errors, heuristic bias, use of misinformation, psychological tendencies, in determining future expected performance and obtainable profits. Existing evidence indicates that past confidence in the

Delphi Study: Influence of Environmental Sustainability Initiatives on Information Systems Table of Contents (first draft) Green IT Current Methods and Solutions Green IT and energy costs Green It and Email Systems Green IT and ICT Green IT and ESS Green IT and TPS Green IT and DSS Green IT and other support systems Green IT and GHG reduction Green IT and the Government Sector Green IT and the Corporate Sector Future Prospects of Green IT in the software industry The paper focuses on how the

GLOBAL FINANCE, INC. (GFI) IT RISK ASSESSMENT PAPER When it comes to the risk assessment of Global Finance, Inc. there were identified vulnerabilities that were occurring in the locations of Technical Security, Management, and Operational. Vulnerabilities at the company are looked at as being weaknesses that could possibly be oppressed by a group of threats or just threats in general. Basically, all of these vulnerabilities are able to be alleviated by safeguards