This document provides an introduction to database management systems. It discusses how database systems have become essential for organizations to store and access crucial information needed to run their businesses. The document traces the evolution of data systems from manual files to modern database management systems and examines how increasing information demands and rapid technology growth drove this transition. It also provides overviews of key database concepts like data modeling, database design, database capabilities for storage, queries and more. Finally, it outlines the roles of various people who work with databases, such as system analysts, database designers, application developers and administrators, and end users.
Big data is everywhere , although sometimes we may not immediately realize it . First thing to be believed is that most of us don't deal with large amount of data in our life except in unusual circumstance. Lacking this immediate experience, we often fail to understand both opportunities as well challenges presented by big data. There are currently a number of issues and challenges in addressing these characteristics going forward.
Big data is everywhere , although sometimes we may not immediately realize it . First thing to be believed is that most of us don't deal with large amount of data in our life except in unusual circumstance. Lacking this immediate experience, we often fail to understand both opportunities as well challenges presented by big data. There are currently a number of issues and challenges in addressing these characteristics going forward.
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
NOSQL Database Engines for Big Data Managementijtsrd
We are living in the digital world and last two decades have seen significant expansion in the information on internet technology. In present digital world the IOT is most popular term means computers, mobile phones and physical devices like sensors are connected to internet. With the rapid outreach of internet it is very important to focus on technological advancements for managing huge amount of data with easy access. Mrs. Yasmeen "NOSQL Database Engines for Big Data Management" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18608.pdf
Moving records management from a paper based strategy to a electronic strategy requires re-thinking what needs to be protected and where the threats to security exist.
The key is to stop focusing on the artifact (the document) and focus on the information that is important. Documents are just the storage media to move the information from person to person.
Presentation on using workflow to implement a highly used ECM system.
Provides a step-by-step outline how to understand user needs through marketing techniques such as user journeys and persona building.
Introduces the concept that ECM is an organically growing system rather than an architected software solution.
Security issues associated with big data in cloud computingIJNSA Journal
In this paper, we discuss security issues for cloud
computing, Big data, Map Reduce and Hadoop
environment. The main focus is on security issues i
n cloud computing that are associated with big
data. Big data applications are a great benefit to
organizations, business, companies and many
large scale and small scale industries.We also disc
uss various possible solutions for the issues
in cloud computing security and Hadoop. Cloud compu
ting security is developing at a rapid pace
which includes computer security, network security,
information security, and data privacy.
Cloud computing plays a very vital role in protecti
ng data, applications and the related
infrastructure with the help of policies, technolog
ies, controls, and big data tools
.
Moreover,
cloud computing, big data and its applications, adv
antages are likely to represent the most
promising new frontiers in science.
In this paper, we discuss security issues for cloud computing, Map Reduce and Hadoop
environment. We also discuss various possible solutions for the issues in cloud computing
security and Hadoop. Today, Cloud computing security is developing at a rapid pace which
includes computer security, network security and information security. Cloud computing plays a
very vital role in protecting data, applications and the related infrastructure with the help of
policies, technologies and controls.
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
Integrating user needs into ECM projects is key to success. Whether it is a initial implementation or a reboot or just expanding use, user needs and UX testing should be integrated into every project
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxjessiehampson
Week 4 Lecture 1 - Databases and Data Warehouses
Management of Information Systems
Databases and Data Warehouses
The impact of database technology on how business is conducted today cannot be overemphasized. This technology has enabled an information industry with comprehensive influences on businesses and individuals. Databases store data that populate web pages and other interactive networked technologies. Search engines, e-commerce, and social media would not exist without databases. With database support, larger tasks can be accomplished by fewer people.
Effective data management is the principal benefit of IT. Database management systems (DBMSs) enable the fast creation of databases and manipulation of data on an aggregate basis or down to the smallest detail for business purposes. Databases support most web pages and other interactive networked technology. DBMSs support target marketing, financial management, decision-making, distribution of goods and services, customer service, and other activities. It is imperative, in the age of data mining, and “big data,” for knowledge workers to understand how databases work and how data are used operationally and strategically in business management.
Database analysis and management skills are mandatory in the marketplace. IT professionals develop and implement databases. However, data is essential to the non-technical professional who uses the data for decision making regarding accounting, marketing, logistics, senior management, and other functional areas.
The relational database model is common. However, data can be organized in other ways. “Big Data” prompted the use of other database models. “NoSQL” database models are non-relational and do not require SQL to retrieve data. NoSQL databases can be structured by object, document, key-value, graph, column, and other possibilities
In relational databases, a primary key is a field in a table that contains a unique value used to differentiate between rows of data. The primary key is usually a number, or a computer generated globally unique identifier (GUID). Sometimes a composite key is used differentiate between table rows. A composite key is a combination of the values in two or more fields in a table that when combined are unique in the table and serve as a primary key. A foreign key is used to link data between two tables. A foreign key in a table is the primary key of a related table.
Databases contain different types of fields. Some types are, number, text, image, video, audio, geographical coordinates, and others. If a number is not used for mathematical calculations, it is best to assign a text type to it in a database to avoid the need to convert it from a number to a string after retrieval.
SQL is a popular query language used to retrieve data from relational databases. SQL can be used to retrieve data from more than one table by use of a “join.” A join query retrieves data from rows in two or more tables, where the value of the foreign ...
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
NOSQL Database Engines for Big Data Managementijtsrd
We are living in the digital world and last two decades have seen significant expansion in the information on internet technology. In present digital world the IOT is most popular term means computers, mobile phones and physical devices like sensors are connected to internet. With the rapid outreach of internet it is very important to focus on technological advancements for managing huge amount of data with easy access. Mrs. Yasmeen "NOSQL Database Engines for Big Data Management" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18608.pdf
Moving records management from a paper based strategy to a electronic strategy requires re-thinking what needs to be protected and where the threats to security exist.
The key is to stop focusing on the artifact (the document) and focus on the information that is important. Documents are just the storage media to move the information from person to person.
Presentation on using workflow to implement a highly used ECM system.
Provides a step-by-step outline how to understand user needs through marketing techniques such as user journeys and persona building.
Introduces the concept that ECM is an organically growing system rather than an architected software solution.
Security issues associated with big data in cloud computingIJNSA Journal
In this paper, we discuss security issues for cloud
computing, Big data, Map Reduce and Hadoop
environment. The main focus is on security issues i
n cloud computing that are associated with big
data. Big data applications are a great benefit to
organizations, business, companies and many
large scale and small scale industries.We also disc
uss various possible solutions for the issues
in cloud computing security and Hadoop. Cloud compu
ting security is developing at a rapid pace
which includes computer security, network security,
information security, and data privacy.
Cloud computing plays a very vital role in protecti
ng data, applications and the related
infrastructure with the help of policies, technolog
ies, controls, and big data tools
.
Moreover,
cloud computing, big data and its applications, adv
antages are likely to represent the most
promising new frontiers in science.
In this paper, we discuss security issues for cloud computing, Map Reduce and Hadoop
environment. We also discuss various possible solutions for the issues in cloud computing
security and Hadoop. Today, Cloud computing security is developing at a rapid pace which
includes computer security, network security and information security. Cloud computing plays a
very vital role in protecting data, applications and the related infrastructure with the help of
policies, technologies and controls.
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
Integrating user needs into ECM projects is key to success. Whether it is a initial implementation or a reboot or just expanding use, user needs and UX testing should be integrated into every project
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxjessiehampson
Week 4 Lecture 1 - Databases and Data Warehouses
Management of Information Systems
Databases and Data Warehouses
The impact of database technology on how business is conducted today cannot be overemphasized. This technology has enabled an information industry with comprehensive influences on businesses and individuals. Databases store data that populate web pages and other interactive networked technologies. Search engines, e-commerce, and social media would not exist without databases. With database support, larger tasks can be accomplished by fewer people.
Effective data management is the principal benefit of IT. Database management systems (DBMSs) enable the fast creation of databases and manipulation of data on an aggregate basis or down to the smallest detail for business purposes. Databases support most web pages and other interactive networked technology. DBMSs support target marketing, financial management, decision-making, distribution of goods and services, customer service, and other activities. It is imperative, in the age of data mining, and “big data,” for knowledge workers to understand how databases work and how data are used operationally and strategically in business management.
Database analysis and management skills are mandatory in the marketplace. IT professionals develop and implement databases. However, data is essential to the non-technical professional who uses the data for decision making regarding accounting, marketing, logistics, senior management, and other functional areas.
The relational database model is common. However, data can be organized in other ways. “Big Data” prompted the use of other database models. “NoSQL” database models are non-relational and do not require SQL to retrieve data. NoSQL databases can be structured by object, document, key-value, graph, column, and other possibilities
In relational databases, a primary key is a field in a table that contains a unique value used to differentiate between rows of data. The primary key is usually a number, or a computer generated globally unique identifier (GUID). Sometimes a composite key is used differentiate between table rows. A composite key is a combination of the values in two or more fields in a table that when combined are unique in the table and serve as a primary key. A foreign key is used to link data between two tables. A foreign key in a table is the primary key of a related table.
Databases contain different types of fields. Some types are, number, text, image, video, audio, geographical coordinates, and others. If a number is not used for mathematical calculations, it is best to assign a text type to it in a database to avoid the need to convert it from a number to a string after retrieval.
SQL is a popular query language used to retrieve data from relational databases. SQL can be used to retrieve data from more than one table by use of a “join.” A join query retrieves data from rows in two or more tables, where the value of the foreign ...
Data warehousing is a technique for collecting and managing data from multiple internal and
external sources to provide meaningful business insights. Data warehouses are designed to give a long-range
view of data over time and provide a decision support system environment. They are a vital component of
business intelligence, which is designed for data analysis and reporting. They are used to provide greater
insight into the performance of a business. This paper provides a brief introduction on data warehousing
CHAPTER5Database Systemsand Big DataRafal OlechowsJinElias52
CHAPTER
5
Database Systems
and Big Data
Rafal Olechowski/Shutterstock.com
Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Know?Did Yo
u
• The amount of data in the digital universe is expected
to increase to 44 zettabytes (44 trillion gigabytes) by
2020. This is 60 times the amount of all the grains of
sand on all the beaches on Earth. The majority of
data generated between now and 2020 will not be
produced by humans, but rather by machines as they
talk to each other over data networks.
• Most major U.S. wireless service providers have
implemented a stolen-phone database to report and
track stolen phones. So if your smartphone or tablet
goes missing, report it to your carrier. If someone else
tries to use it, he or she will be denied service on the
carrier’s network.
• You know those banner and tile ads that pop up on
your browser screen (usually for products and
services you’ve recently viewed)? Criteo, one of
many digital advertising organizations, automates the
recommendation of ads up to 30 billion times each day,
with each recommendation requiring a calculation
involving some 100 variables.
Principles Learning Objectives
• The database approach to data management has
become broadly accepted.
• Data modeling is a key aspect of organizing data and
information.
• A well-designed and well-managed database is an
extremely valuable tool in supporting decision making.
• We have entered an era where organizations are
grappling with a tremendous growth in the amount of
data available and struggling to understand how to
manage and make use of it.
• A number of available tools and technologies allow
organizations to take advantage of the opportunities
offered by big data.
• Identify and briefly describe the members of the hier-
archy of data.
• Identify the advantages of the database approach to
data management.
• Identify the key factors that must be considered when
designing a database.
• Identify the various types of data models and explain
how they are useful in planning a database.
• Describe the relational database model and its funda-
mental characteristics.
• Define the role of the database schema, data definition
language, and data manipulation language.
• Discuss the role of a database administrator and data
administrator.
• Identify the common functions performed by all data-
base management systems.
• Define the term big data and identify its basic
characteristics.
• Explain why big data represents both a challenge and
an opportunity.
• Define the term data management and state its overall
goal.
• Define the terms data warehouse, data mart, and data
lakes and explain how they are different.
• Outline the extract, transform, load process.
• Explain how a NoSQL database is different from an
SQL database.
• Discuss the whole Hadoop computing environment and
its various components.
• Define the term in-memory database and ex ...
● Why Databases?
● Why Database Design is Important?
● The Database System Environment and Functions.
● Managing the Database System: A Shift in Focus.
Most schools do not realize full advantages of scaling up due to administrative challenges and manual processing of student data. MIS systems allow for great automation of most processes freeing up time for teachers to concentrate on core functions.
In this PPT, you will learn:
• The difference between data and information
• What a database is, the various types of databases, and why they are valuable assets for
decision making
• The importance of database design
• How modern databases evolved from file systems
• About flaws in file system data management
• The main components of the database system
• The main functions of a database management system (DBMS)
An Comprehensive Study of Big Data Environment and its Challenges.ijceronline
Big Data is a data analysis methodology enabled by recent advances in technologies and Architecture. Big data is a massive volume of both structured and unstructured data, which is so large that it's difficult to process with traditional database and software techniques. This paper provides insight to Big data and discusses its nature, definition that include such features as Volume, Velocity, and Variety .This paper also provides insight to source of big data generation, tools available for processing large volume of variety of data, applications of big data and challenges involved in handling big data
Paper presented at the Second Congres International Des Etudes Somaliennes Pour Une Culture De La Paix En Somalie, 25-27 October 1995, Institut du Monde Arab, Paris.
Paper presented at the Second Congres International Des Etudes Somaliennes
Pour Une Culture De La Paix En Somalie, 25-27 October 1995, Institut du Monde Arab, Paris.
Problem: Tough competition and demanding customers.
Solutions: Redesigned order and production processes reduce costs, increase revenue, and improve customer service.
At the business level of strategy, the key question is, "How can we compete effectively in this particular market?" The market might be light bulbs, utility vehicles, or cable television.
Important Managerial Questions:
What is strategy?
What is strategic advantage?
Information Systems as a strategic resource
How do we use Information Systems to achieve some form of strategic advantage over competitors?
Types of information systems?
Function of different types of system
Benefits of information systems
The characteristics of types of Information Systems
Also known as Critical Network Analysis
Developed by Dupont and Remington Rand in the late 1950s for managing plant maintenance projects
Uses one duration estimate for each activity
Provides basic framework for project planning and contro
The Meaning of Process
2.2 Software Process Models
2.3 Tools and Techniques for Process Modeling
2.4 Practical Process Modeling
2.5 Information System Example
2.6 What this Chapter Means for You
Somalis’ national consciousness is based on the shared heritage of Islam, belief in a common
ancestor, language and culture. This notion, which is also called unity, has
preserved Somali-speaking people for centuries.
European exploration opened the door to colonialism.
The opening of the Suez Canal in 1869 created a geopolitical situation which
increased the competition for control of the coast along the Red Sea and the Indian
Ocean among the European colonial powers.
Explain growth and importance of databases
Name limitations of conventional file processing
Identify five categories of databases
Explain advantages of databases
Identify costs and risks of databases
List components of database environment
Describe evolution of database systems
Understand how the database approach is Understand how the database approach is different and superior to earlier data systems different and superior to earlier data systems
Examine how information demand and Examine how information demand and technology explosion drive database systems technology explosion drive database systems
Trace the evolution of data systems and note Trace the evolution of data systems and note how we have arrive at the database approach how we have arrive at the database approach
Comprehend the benefits of database systems Comprehend the benefits of database systems and perceive the need for them and perceive the need for them
Survey briefly various data models, types of Survey briefly various data models, types of databases, and the database industry
The Federal Enterprise Architecture (FEA) is the latest attempt by the US federal government to unite its myriad agencies and functions under a single common and ubiquitous enterprise architecture.
TOGAF divides an enterprise architecture into four categories, as follows:
Business architecture—Describes the processes the business uses to meet its goals
Application architecture—Describes how specific applications are designed and how they interact with each other
Data architecture—Describes how the enterprise data stores are organized and accessed
Technical architecture—Describes the hardware and software infrastructure that supports applications and their interactions
System Development Life Cycle
Data, Function, Network, People, Time, Motivation What constitutes the “enterprise”?
Key enterprise architecture terms Enterprise Architecture Terms
How do you achieve perfect alignment?
Importance of alignment
Lack of Alignment
Nature of Complexity
Architectural Principles
Enterprise Architecture definition
System architecture
The Role of EA
Enterprise Frameworks:
Zachman Framework
The Open Group’s Architecture Framework (TOGAF)
The Foundation for Execution
Business architecture
Information architecture
Application architecture
Technology architecture
Implementation
More from Taibah University, College of Computer Science & Engineering (20)
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
1. Introduction to Data
and Information Management
(Database Management Systems IS331)
Lecture 1
Abdisalam Issa-Salwe
Taibah University
College of Computer Science & Engineering
Information Systems Department
Jeffrey A. Hoffer, et al: Modern Database Management, 8th Edition, 2007, Prentice Hall
2
ObjectivesObjectives
Understand how the database approach isUnderstand how the database approach is
different and superior to earlier data systemsdifferent and superior to earlier data systems
Examine how information demand andExamine how information demand and
technology explosion drive database systemstechnology explosion drive database systems
Trace the evolution of data systems and noteTrace the evolution of data systems and note
how we have arrive at the database approachhow we have arrive at the database approach
Comprehend the benefits of database systemsComprehend the benefits of database systems
and perceive the need for themand perceive the need for them
Survey briefly various data models, types ofSurvey briefly various data models, types of
databases, and the database industrydatabases, and the database industry
2. 3
About databaseAbout database
Today, almost all organizations depend on theirToday, almost all organizations depend on their
database systems for the crucial information theydatabase systems for the crucial information they
need to run their business.need to run their business.
In every industry across the board, from retail chainIn every industry across the board, from retail chain
stores to financial institutions, from manufacturingstores to financial institutions, from manufacturing
enterprises to government departments, and fromenterprises to government departments, and from
airline companies to utility businesses, databaseairline companies to utility businesses, database
systems have become the norm for informationsystems have become the norm for information
storage and retrieval.storage and retrieval.
Database systems form the centerpiece of theDatabase systems form the centerpiece of the
growing and maturing electronic commerce.growing and maturing electronic commerce.
Database and Web technologies have merged.Database and Web technologies have merged.
4
About database (contAbout database (cont……))
How were companies running their business beforeHow were companies running their business before
computers came into use?computers came into use?
Organizations needed information to execute theOrganizations needed information to execute the
business processes, sell goods and services, andbusiness processes, sell goods and services, and
satisfy the needs of customers.satisfy the needs of customers.
Manual files supported business operations.Manual files supported business operations.
Accounting personnel performed manualAccounting personnel performed manual
calculations and prepared invoices.calculations and prepared invoices.
Payroll departments manually wrote the checks.Payroll departments manually wrote the checks.
3. 5
About database (contAbout database (cont……))
From the 1970s onward, two striking and remarkableFrom the 1970s onward, two striking and remarkable
phenomena were distinctly observed. (Refer to Figure 1phenomena were distinctly observed. (Refer to Figure 1--11
indicating these two major developments).indicating these two major developments).
First, demand for information has escalated in everyFirst, demand for information has escalated in every
organization.organization.
Organizations have steadily become global and widespread.Organizations have steadily become global and widespread.
Organizations have to contend with fierce competitiveOrganizations have to contend with fierce competitive
pressures.pressures.
They need vast and complex information to stay in businessThey need vast and complex information to stay in business
and make a profit.and make a profit.
Second, the past three decades have witnessed a huge,Second, the past three decades have witnessed a huge,
explosive growth in information technology. Processors haveexplosive growth in information technology. Processors have
become faster, cheaper, and smaller.become faster, cheaper, and smaller.
6
About databaseAbout database
Information, as we know it today, includes bothInformation, as we know it today, includes both
electronic and physical information.electronic and physical information.
The organizational structure must be capable ofThe organizational structure must be capable of
managing this information throughout themanaging this information throughout the
information lifecycle regardless of source or formatinformation lifecycle regardless of source or format
(data, paper documents, electronic documents,(data, paper documents, electronic documents,
audio, video, etc.) for delivery through multipleaudio, video, etc.) for delivery through multiple
channels that may include cell phones and webchannels that may include cell phones and web
interfaces.interfaces.
4. 7
Information ManagementInformation Management
Information management is the collection andInformation management is the collection and
management of information from one or more sourcesmanagement of information from one or more sources
and the distribution of that information to one or moreand the distribution of that information to one or more
audiences.audiences.
Management means the organization of and control overManagement means the organization of and control over
the structure, processing and delivery of information.the structure, processing and delivery of information.
The organizational structure must be capable ofThe organizational structure must be capable of
managing this information throughout the informationmanaging this information throughout the information
lifecycle regardless of source or format (data, paperlifecycle regardless of source or format (data, paper
documents, electronic documents, audio, socialdocuments, electronic documents, audio, social
business, video, etc.) for delivery through multiplebusiness, video, etc.) for delivery through multiple
channels that may include cell phones and webchannels that may include cell phones and web
interfaces.interfaces.
5. 9
About databaseAbout database
Information assets are corporate assets. This principle
should be acknowledged or agreed upon across the
organization otherwise any business case and support
for IM will be weak.
Information must be made available and shared. Of
course not all information is open to anyone, but in
principle the sharing of information helps the use and
exploitation of corporate knowledge
Information the organisation needs to keep is managed
and retained corporately. In other words the retention
and archiving, of information.
If you save a document today, you expect it to be
secured and still available to you tomorrow
What a Database Is and Is Not
l your personal address book in a Word document
l a collection of Word documents
l a collection of Excel Spreadsheets
l a very large flat file on which you run some
statistical analysis functions
l data collected, maintained, and used in airline
reservation
l data used to support the launch of a space shuttle
The word database is commonly used to refer to any of
the following:
10
6. Models of Reality
REALITY
• structures
• processes
DATABASE SYSTEM
DATABASE
DML
DDL
l A database is a model of structures of reality
l The use of a database reflect processes of reality
l A database system is a software system which supports the
definition and use of a database
l DDL: Data Definition Language
l DML: Data Manipulation Language
11
Why Use Models?
Models can be useful when we want to examine or
manage part of the real world
The costs of using a model are often considerably
lower than the costs of using or experimenting with
the real world itself
Examples:
airplane simulator
nuclear power plant simulator
flood warning system
model of US economy
model of a heat reservoir
map
12
7. A Message to Map Makers
A model is a means of communication
Users of a model must have a certain amount of
knowledge in common
A model on emphasized selected aspects
A model is described in some language
A model can be erroneous
A message to map makers: “Highways are not
painted red, rivers don’t have county lines running
down the middle, and you can’t see contour lines on
a mountain” [Kent 78]
13
Use a DBMS when
this is important
persistent storage of data
centralized control of data
control of redundancy
control of consistency and
integrity
multiple user support
sharing of data
data documentation
data independence
control of access and
security
backup and recovery
Do not use a
DBMS when
l the initial investment in
hardware, software, and
training is too high
l the generality a DBMS
provides is not needed
l the overhead for security,
concurrency control, and
recovery is too high
l data and applications are
simple and stable
l real-time requirements
cannot be met by it
l multiple user access is not
needed
14
8. Data Modeling
REALITY
• structures
• processes
DATABASE SYSTEM
MODELdata modeling
l The model represents a perception of structures of
reality
l The data modeling process is to fix a perception of
structures of reality and represent this perception
l In the data modeling process we select aspects and
we abstract
15
Process Modeling
REALITY
• structures
• processes
DATABASE SYSTEM
MODELprocess modeling
l The use of the model reflects processes of reality
l Processes may be represented by programs with
embedded database queries and updates
l Processes may be represented by ad-hoc database
queries and updates at run-time
DML DML
PROG
16
9. Database Design
is a model of structures of reality
supports queries and updates
modeling processes of reality
runs efficiently
The purpose of database design is to create a database
which
17
Database Capabilities
Data Storage
Queries
Optimization
Indexing
Concurrency Control
Recovery
Security
18
10. Data Storage
Disk management
File management
Buffer management
Garbage collection
Compression
19
Queries
Selection
Point
Range
Conjunction
Disjunction
Join
Natural join
Equi join
Theta join
Outer join
Projection
Set operations
Cartesian Product
Union
Intersection
Set Difference
Other
Duplicate elimination
Sorting
Built-in functions:
count, sum, avg, min,
max
Recursive (not in SQL)
SQL queries are composed from the following:
20
11. People that Work With Databases
System Analysts
Database Designers
Application Developers
Database Administrators
End Users
21
System Analysts
Communicate with each prospective database
user group in order to understand its
information needs
processing needs
Develop a specification of each user group’s
information and processing needs
Develop a specification integrating the
information and processing needs of the user
groups
Document the specification
22
12. Database Designers
Choose appropriate structures to
represent the information specified by the
system analysts
Choose appropriate structures to store the
information in a normalized manner in
order to guarantee integrity and
consistency of data
Choose appropriate structures to
guarantee an efficient system
Document the database design
23
Application Developers
Implement the database design
Implement the application programs to
meet the program specifications
Test and debug the database
implementation and the application
programs
Document the database implementation
and the application programs
24
13. Database Administrators
Manage the database structure
participate in database and application development
assist in requirement analysis
participate in database design and creation
develop procedures for integrity and quality of data
facilitate changes to database structure
seek communitywide solutions
assess impact on all users
provide configuration control
be prepared for problems after changes are made
maintain documentation
25
Database Administrators (cont.)
Manage data activity
establish database standards consistent with
data administration standards
establish and maintain data dictionary
establish data proponencies
work with data proponents to develop data
access and modification rights
develop, document, and train staff on backup
and recovery procedures
publish and maintain data activity standards
documentation
26
14. Database Administrators (cont.)
Manage the database management system
generate database application performance reports
investigate user performance complaints
assess need for changes in database structure or
application design
modify database structure
evaluate and implement new DBMS features
tune the database
Establish the database data dictionary
data names, formats, relationships
cross-references between data and application
programs
(see metadata slide)
27
End Users
Parametric end users constantly query and update
the database.
They use canned transactions to support standard queries
and updates.
Casual end users occasional access the database,
but may need different information each time.
They use sophisticated query languages and browsers.
Sophisticated end users have complex
requirement and need different information each
time.
They are thoroughly familiar with the capabilities of the
DBMS.
28