Verified Document

Databases Analysis And Overview Of Database Systems Essay

¶ … Databases Analysis and Overview of Database Systems in the Enterprise

The pervasive adoption of databases for aggregating, analyzing, parsing, reporting and storing data continues to exponentially increase over time, as the information needs of companies continued to increase. The foundation fo nearly every enterprise-wide system and computing platform includes integration to databases of many types, from object-oriented to relational (Lungu, Velicanu, Botha, 2009). Every Enterprise Resource Planning (ERP) system today relies on databases for product, pricing, costing, production scheduling, service coordination and manufacturing execution task coordination as well (Bremer, Carey, 1987). Databases have become an essential component of every enterprise system in use today, from coordinating supply chains, sourcing, production and tracking customer activity and sales through Customer Relationship Management (CRM) systems (Madduri, Shi, Baker, Ayachitula, 2007). Object-oriented databases are pervasively used in Computer-Aided Drawing (CAD) applications as well, given their speed and accuracy in managing geographic and graphic primitives (Chu, 1995).

Fundamentals of Database Architecture

All databases share a series of common features, functional areas, and approaches to data modeling. In addition, all have the ability to integrate with other databases...

All databases also support a series of database schema and advanced taxonomy definition, which is entirely dependent on the foundational elements of the underlying architecture. Object-oriented databases use orthogonal objects that carry their own functional definitions and taxonomy definitions (Hansen, 1995). Relational databases (RDBMS) rely on a more schema-based approach to define the data models used for completing analysis, reporting and ensuring a high degree of integration reliability and security (Hansen, 1995). All databases rely on schema, subschema and within these constructs, the ability to define data attributes. Of the two dominant types of databases, OODBMS and RDBMS, the latter performs best for high-volume transaction processing (Hooper, Page, 1996) while OODBMS is best for managing unstructured content and the rapid analysis and classification fo object-based content (Newing, 1997).
Defining Relational Database Architectures

Relational database management (RDBMS) systems are the dominant platform in use by enterprise globally today due to their transaction-based strengths, scalability and enhanced security features in addition to ACID compliance critical to governments globally (Lungu, Velicanu, Botha, 2009). As a result of their transaction-level performance advantages, RDBMS systems are pervasively used…

Sources used in this document:
Sarkar, S.S. (1989). Architecture and language for a layered relational database. The University of Texas at Dallas). ProQuest Dissertations and Theses,, 145

Toth, K.C. (1980). Distributed database architecture and query processing strategies. Carleton University (Canada)). ProQuest Dissertations and Theses,,

Worboys, M. (1989). Relational databases: A theoretical primer. Information and Software Technology, 31(3), 115-115.
Cite this Document:
Copy Bibliography Citation

Related Documents

Databases and Data Management Every Day, Nurses
Words: 1498 Length: 4 Document Type: Essay

Databases and Data Management Every day, nurses health care practitioners challenged managing large quantities data information. Unless data information translated knowledge, meaningful . Databases data management techniques, designed effectively, present health care organizations Epic database is designed for large health care organizations. The database captures data related to patient care in a health care organization. The database facilitates patient registration, treatment scheduling, lab test results, radiology information, and billing. The database is

Database Technology Administration Database Technology
Words: 4402 Length: 15 Document Type: Essay

" "STUDENT INFORMATION TABLE" ( "STUDENT ID" CHARACTER (4) NOT NULL, NAME CHARACTER (25) NOT NULL, "STREET NUMBER" CHARACTER (10) NOT NULL, "STREET NAME" CHARACTER (25) NOT NULL, CITY CHARACTER (25) NOT NULL, STATE CHARACTER (10) NOT NULL, EMAIL CHARACTER (25) NOT NULL, "PHONE NUMBER" CHARACTER (15) NOT NULL ); CONNECT RESET; SQL FOR Book_Information CONNECT TO LIBRARY; CREATE TABLE "USER"; CREATE TABLE BookInformation ( "BookISBN" CHARACTER (10) NOT NULL; "AUTHOR" CHARACTER (25) NOT NULL; "TITLE" CHARACTER (50) NOT NULL; "PRICE" CHARACTER (10) NOT NULL; CONNECT RESET; SQL STATEMENT FOR

Database Administrator for Department Store
Words: 3901 Length: 13 Document Type: Research Paper

Database Administrator for Department Store Scenario The department store has expanded in the local region by opening five more bookstores, and the bookstore has launched a series of marketing campaign to increase sales and attract new customers. The objective of this technical report is to develop a plan to create and maintain an enterprise-wide database system that will assist the bookstore to hold the inventory and sales data. The database design will

Database What Is a Database
Words: 1421 Length: 5 Document Type: Term Paper

These factors further accelerate the value and TCO of databases over time. Describe the features, tools, and utilities of Structured Query Language (SQL). How can tasks be automated with SQL? SQL has specifically been designed with features, tools and utilities to enable programmers to support nth-tier data architectures in addition to legacy client-server computing scenarios. The development and continual improvement of the features, tools and utilities of SQL for automating tasks

Database Marketing, Sales Force Automation and Virtual
Words: 2511 Length: 8 Document Type: Term Paper

Database marketing, sales force automation and virtual reality are three of the newest trends in technology to impact the way company's market to their customers. All three technologies offer specific advantages and disadvantages for their use. The appropriate use of the technology must be based solidly on the type of product, costs incurred, and the nature of relationship with clients. When used in a judicious way, all three technologies can

Analysis of Operating Systems Protective Measures
Words: 2837 Length: 8 Document Type: Research Paper

Operating Systems Protection Operating systems are the collection of programs that assist users operating computer hardware to control and managing the computer resources, providing the user interface and enforcing security measures. An operating system is referred as the physical environment that provides an interface between the underlying computer hardware and data. The advent of information and networking systems has led to the connectivity of the computer system that assists in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now