Updated:

Database Administration and Concurrency Management Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Concurrency control methods used in database management systems

When it comes to defining the best concurrency control methods, one must give credit to the optimistic (validation) one since it prevents a company from facing a deadlock (Topi &Tucker, 2014). The approach in question allows for blocking a transaction from occurring once it fails to pass a certain stage. Dismissing the given strategy, a company may fail to track down the factors that cause transactions to fail and, therefore, overlook some of the major obstacles. Particularly, the distributed locking technique (Topi &Tucker, 2014) should be used as it helps introduce different locks at the existing sites and, thus, make data sharing more flexible. The refusal from DLT and the adoption of the uniform approach make the process of database management less convoluted yet jeopardizes the security of the entire data system.

For instance, the specified method can be used in case a company has several affiliates and, therefore, several databases with the corresponding data. Once the decentralized strategy is used, the members of each department will be able to navigate the data related to their area. Consequently, less confusion will occur.

Primary decisions in the database administration

To manage the data that grows consistently, a database manager must use the strategy that will help arrange the incoming information and process it fast. Particularly, the information processing tools, including the ones for arranging data based on its value, the identification of its mean, median, and mode, the basic statistical analysis (e.g., standard deviation identification), etc. must be conducted.

To facilitate data integrity, one should consider the tools such as PeopleSoft (Data integrity tools, 2015) and the related software. In addition, one must consider making security tighter by introducing a system of passwords and ID tools. Last but definitely not least, the basic security principles such as non-disclosure of corporate data to the third parties must be reinforced in the organization.

Reference List

Data integrity tools. (2015). Web.

Topi, H., &Tucker, A. (2014). Computing handbook, third edition: Information systems and information technology (3rd ed.). New York City, New York: CRC Press.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, January 19). Database Administration and Concurrency Management. https://ivypanda.com/essays/database-administration-and-concurrency-management/

Work Cited

"Database Administration and Concurrency Management." IvyPanda, 19 Jan. 2021, ivypanda.com/essays/database-administration-and-concurrency-management/.

References

IvyPanda. (2021) 'Database Administration and Concurrency Management'. 19 January.

References

IvyPanda. 2021. "Database Administration and Concurrency Management." January 19, 2021. https://ivypanda.com/essays/database-administration-and-concurrency-management/.

1. IvyPanda. "Database Administration and Concurrency Management." January 19, 2021. https://ivypanda.com/essays/database-administration-and-concurrency-management/.


Bibliography


IvyPanda. "Database Administration and Concurrency Management." January 19, 2021. https://ivypanda.com/essays/database-administration-and-concurrency-management/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1