Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Advantages and disadvantages of relational databases
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Advantages and disadvantages of relational databases
During my research, I discovered three database trends. The first trend bridges relational and non-rational databases together. The second trend offers databases in the cloud as a service. Lastly, the third trend is the focus for increased database security. Each trend aims to improve databases and the capabilities and services that they provide due to increasing demand and expanding needs.
The author discusses while relational databases will be around for quite a while, their overall peak may be on the decline due to non-relational databases. The age of relational databases is starting to show because of they require specific memory and disk requirements; however, as computer technology advances for memory and disks, the requirements are lessening. Non-relational databases, such as NoSQL, are “horizontally scalable, distributed, and open source”. They offer backups for web servers, content management systems, and document storage just to name a few. This article serves those interested in how relational databases are changing because of non-relational databases and gives the reader enough technical information to research more on the specific impacts. This article is unique that it directly discusses technical details between the two types of databases. Overall, the tone appears to show a realistic sense of where things are heading within databases and that companies need to be ready and flexible to the pending changes ahead.
In the trade journal, the author discusses the impending transition of relational databases to non-relational databases. Despite this transition appearing to be imminent, the author acknowledges that as non-relational databases grow, the relational databases will fade slowly over time because their a...
... middle of paper ...
...., credit card numbers). Next, the article addresses database security in that they are not “inherently secure” which leads to how does one make sure to properly secure databases and the data that resides within. According to the author, the thirteen essentials include monitoring database performance while noting unusal activity to identify threats, using security tools to monitor database unauthorized activity, and testing regularly to ensure the database is properly defended from potential tactics used to attack it. The author concludes that security is a priority and the “most important part” of the job when working with databases. The material presented in this article is relevant to my topic for databases and the database security trend. It serves as a starting point for more research to fully understand all security essentials when working with databases.
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
In 1977, Larry Ellison, Bob Miner, and Ed Oates founded System Development Laboratories. After being inspired by a research paper written in 1970 by an IBM researcher titled “A Relational Model of Data for Large Shared Data Banks” they decided to build a new type of database called a relational database system. The original project on the relational database system was for the government (Central Intelligence Agency) and was dubbed ‘Oracle.’ They thought this would be appropriate because the meaning of Oracle is source of wisdom.
[6] O’Leary. Knowledge discovery as a threat to database security. In G. Piatetsky-Shapiro & W. J. Frawley, ‘Knowledge discovery in databases’, AAAI Press, page 507-516, 1991.
The last decade can be marked as a period of significant changes in the business world. Being accustomed to utilize computers as a powerful tool with its office applications such as Microsoft Word and Excel. In the 1990s office workers first faced the opportunity to share information using the Internet (McNurlin, 2009). However, the situation became even more different with the transition to the third millennium. With a further development of information technologies, the majority of big enterprises had to reconstitute their business processes and to make the transition to the Internet economy. Enterprise resource planning (ERP), supply-chain management (SCM), customer relationship management (CRM) software and the variety of other information systems became essential components of the new economy. It can be expected, that all these complex solutions were designed to bring great benefits for different sides of the corporate activity, in particular, decisions made by top-managers are expected to become nearer to the ideal, customer service is to be improved and collaboration more prolific. Nevertheless, to ensure the desired results it should be taken into account that the key concept of these reorganizations is an information or a data, dealing with which can be a serious issue, and wide utilizing of the data warehouses in contemporary organizations confirms this fact.
Inconsistently storing organization data creates a lot of issues, a poor database design can cause security, integrity and normalization related issues. Majority of these issues are due to redundancy and weak data integrity and irregular storage, it is an ongoing challenge for every organization and it is important for organization and DBA to build logical, conceptual and efficient design for database. In today’s complex database systems Normalization, Data Integrity and security plays a key role. Normalization as design approach helps to minimize data redundancy and optimizes data structure by systematically and properly placing data in to appropriate groupings, a successful normalize designed follows “First Normalization Flow”, “Second Normalization Flow” and “Third Normalization flow”. Data integrity helps to increase accuracy and consistency of data over its entire life cycle, it also help keep track of database objects and ensure that each object is created, formatted and maintained properly. It is critical aspect of database design which involves “Database Structure Integrity” and “Semantic data Integrity”. Database Security is another high priority and critical issue for every organization, data breaches continue to dominate business and IT, building a secure system is as much important like Normalization and Data Integrity. Secure system helps to protect data from unauthorized users, data masking and data encryption are preferred technology used by DBA to protect data.
NoSQL are designed to expand transparently to take advantages of new nodes and they are built using low cost hardware, so cost shouldn’t be a problem. Big Data In today’s world, the transactions are so frequent that the data generated out of these transactions is huge. It is very difficult to store these huge transactional data in the traditional database systems. NoSQL with its elastic scaling feature, it is possible to increase the size of the database to store huge amount of transactional data. All the challenges involved in processing these huge transactional data can be overcome with NoSQL database systems. No DBA required NoSQL database systems can handle many of the things on its own. Dedicated database administrators are not required to handle day to day database operations. Since these systems have simpler data models, automated repair etc., No administrator is necessary to handle these things. Economics Traditional databases costs more money. The amount of space that you get on buying traditional database systems is less when compared to the NoSQL database system. In other words, cost per gigabyte per second or transaction per second is many times less when compared to traditional database management system. Flexible data model NoSQL database systems have flexible data models, unlike traditional relational database management systems. If any changes to the data model in traditional database systems, then it may bring down whole database system or the functions might not work as expected. But this is not the case with NoSQL database system. NoSQL has far more relaxed data model which allows the user to add a new column to store data without any much fuss. NoSQL key value stores and document the database virtually in a data
Oracle's relational databases represent a new and exciting database technology and philosophy on campus. As the Oracle development projects continue to impact on University applications, more and more users will realize the power and capabilities of relational database technology.
In the past, most of the databases were centralized, protected, and kept in a one location using a complicated database system known as centralized database. Nowadays, with the new technology of personal computers and cell phones, a new sort of database has appeared, and it seems that majority of people are pleasant with it, even if their private data is split everywhere. Many enterprises had changed their databases from the centralized databases, into the distributed database system, since it meets the demand of accessing and processing the data in the organization. Distributed database technology is considered as one of the most remarkable developments in this century (Ozsu, 1991; Rahimi & Haug, 2010; Cain, 2012). Distributed databases are basically a collection of databases that are divided on multiple computers which are connected logically but located in different physical locations, and each site manages its own local data. In contrast, centralized database is a database that is located in a one location and it is considered as a big single database (Connolly & Begg, 2010).
Nowadays, the information is the most treasured asset in an organization, due to it along with the experience represents the input necessary to take appropriate decisions and consequently to have success in the business. Almost all the information and knowledge related with the processes business, goods and services offered by a company, is processed, managed and stored through technology and information systems, thus the security of information has become increasingly important and plays a critical role in the enterprise government.
Managing and manipulating data is easy ever since databases were developed for IT guys could just increase the numbers without knowing what output from the database is most useful. Although IT guys are able to manage huge amounts of data, they still cannot impress the topic experts for data management considers data to be just data (Hammond, 2006). Judging mea...
Moreover, E-commerce has widely recognized nowadays among people. Therefore such data should be secure in databases and privacy of data should be maintained.
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.
of multiple types of end users. The data is stored in one location so that they
A close analysis of the current global security concern is reflected in the objectives of various learning and global institutions’ information security programs. A number of institutions including University of Colorado, Harvard University and University of Missouri share a common theme in their objectives. Top on the list of such objectives is the need to establish guidelines that allow users of their particular information systems practice good data stewardship, ensuring reliability and availability of their systems and most important the need to protect the system as well as other information assets from unauthorized access, modification or sharing (University of Missouri, 2013).
In our world, people rely heavily on the power of technology every day. Kids are learning how to operate an iPad before they can even say their first word. School assignments have become virtual, making it possible to do anywhere in the world. We can receive information from across the world in less than a second with the touch of a button. Technology is a big part of our lives, and without it life just becomes a lot harder. Just like our phones have such an importance to us in our daily lives, database management systems are the same for businesses. Without this important software, it would be almost impossible for companies to complete simple daily tasks with such ease.