Recruit software engineer and data engineer

Assignment Help Basic Computer Science
Reference no: EM132773874

Oliver's business is now growing. He built a company and has sales agents and sales supervisors working for him all over England. He realizes using google spreadsheets is not sustainable.

He wants to invest in a scalable system and he is thinking to recruit a software engineer and a data engineer (you).

The software engineer has to come up with a mobile app that allows the sales agents to report their sales from the app.

The app should be connected with a data pipeline that would eventually make the data ready for analysis.

What would be your strategy to build a strong and reliable data pipeline and how will you structure it ? Explain the different steps for processing the data, what makes each step important?

Mention which tools would you use for each of these steps. Feel free to argument as much as you feel it relevant You're free to make assumptions about the mobile app e.g. The raw data is stored in a No-Sql database...

Reference no: EM132773874

Questions Cloud

Which issue in accounting for foreign currency transaction : Which main issue in accounting for foreign currency transactions is? how to distinguish between denomination currency or settlement currency
Divisional form of structure : Describe the kinds of firms should use the divisional form of structure. Provide an example. with a reference
Which situations will marley pty ltd not be required : Juliet Ltd is listed public company and has a 60% controlling,Which situations will Marley Pty Ltd not be required to prepare consolidated financial statements?
What is the amount of interest revenue recognized : Assume that the fiscal year of Smith ends June 30. Using a 360 day year. What is the amount of interest revenue recognized by Smith in the following year
Recruit software engineer and data engineer : He wants to invest in a scalable system and he is thinking to recruit a software engineer and a data engineer (you).
Market skimming and market penetration : Research an article that outlines both strategies and discuss how these two strategies enable a business to be successful
Describe the types of organizations : Describe the types of organizations are best suited to the adhocracy form of structure. Provide an example.
Explain what the viro framework is : 1. Explain how value is created from a firm's resources and capabilities, noting whether human resources are tangible or intangible. Do you agree with this clas
Find which a business combination occurs on : On 15 September 2019 it acquired an additional 25% interest, and on 15 March 2020 a further 15%. Under AASB 3/IFRS 3, a business combination occurs on

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Attachment that contains a malicious piece

A computer user with bad intent has sent a mass email to thousands of email addresses with an attachment that contains a malicious piece of software.

  Quality of service

Evaluate the importance quality of service has to designers. your attention to ensure quality of service for a team of designers that you were managing.

  Diagrams to model the system

1. Use entity relationship and use case diagrams to model the system. a) Identify at least four entities. b) Identify the relationships among the entities

  Limitations of the use of ai technologies

Determine some of the limitations or dangers you see in the use of AI technologies such as expert systems, virtual reality, and intelligent agents?

  What is the probability that the vehicle you choose

Suppose that you were asked to choose a new car from this city at random and record its color. What is the probability that the vehicle you choose has a color

  Reported by major malware containment vendor

Using a web browser,perform some reasearch on a newer malware variant that has been reported by a major malware containment vendor.

  Stock intrinsic value per share

If the stock's current price is $34.67 per share, what is the stock's intrinsic value per share expected to be in four years?

  Research fundamentals associated with cybersecurity

Research the fundamentals associated with cybersecurity, choose one and explain why this fundamental is essential.

  What leadership theories that geisha williams

What leadership theories that Geisha Williams has while leading 500 companies. Explain, examples

  Which solution do you consider to have better application

Remember to properly cite your sources according to APA guidelines.

  What are the pro and con of digital rights managment

What are the pro's and con's of Digital Rights Managment?

  What is the primary difference between a microcontroller

What is the primary difference between a microcontroller or microprocessor, and an FPGA?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd