Relational Databases And Non Rational Databases

1077 Words3 Pages

During my research, I discovered three database trends. The first trend bridges relational and non-rational databases together. The second trend offers databases in the cloud as a service. Lastly, the third trend is the focus for increased database security. Each trend aims to improve databases and the capabilities and services that they provide due to increasing demand and expanding needs.

The author discusses while relational databases will be around for quite a while, their overall peak may be on the decline due to non-relational databases. The age of relational databases is starting to show because of they require specific memory and disk requirements; however, as computer technology advances for memory and disks, the requirements are lessening. Non-relational databases, such as NoSQL, are “horizontally scalable, distributed, and open source”. They offer backups for web servers, content management systems, and document storage just to name a few. This article serves those interested in how relational databases are changing because of non-relational databases and gives the reader enough technical information to research more on the specific impacts. This article is unique that it directly discusses technical details between the two types of databases. Overall, the tone appears to show a realistic sense of where things are heading within databases and that companies need to be ready and flexible to the pending changes ahead.

In the trade journal, the author discusses the impending transition of relational databases to non-relational databases. Despite this transition appearing to be imminent, the author acknowledges that as non-relational databases grow, the relational databases will fade slowly over time because their a...

... middle of paper ...

...., credit card numbers). Next, the article addresses database security in that they are not “inherently secure” which leads to how does one make sure to properly secure databases and the data that resides within. According to the author, the thirteen essentials include monitoring database performance while noting unusal activity to identify threats, using security tools to monitor database unauthorized activity, and testing regularly to ensure the database is properly defended from potential tactics used to attack it. The author concludes that security is a priority and the “most important part” of the job when working with databases. The material presented in this article is relevant to my topic for databases and the database security trend. It serves as a starting point for more research to fully understand all security essentials when working with databases.

Open Document