Database Administration and Concurrency Management Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Concurrency control methods used in database management systems

When it comes to defining the best concurrency control methods, one must give credit to the optimistic (validation) one since it prevents a company from facing a deadlock (Topi &Tucker, 2014). The approach in question allows for blocking a transaction from occurring once it fails to pass a certain stage. Dismissing the given strategy, a company may fail to track down the factors that cause transactions to fail and, therefore, overlook some of the major obstacles. Particularly, the distributed locking technique (Topi &Tucker, 2014) should be used as it helps introduce different locks at the existing sites and, thus, make data sharing more flexible. The refusal from DLT and the adoption of the uniform approach make the process of database management less convoluted yet jeopardizes the security of the entire data system.

For instance, the specified method can be used in case a company has several affiliates and, therefore, several databases with the corresponding data. Once the decentralized strategy is used, the members of each department will be able to navigate the data related to their area. Consequently, less confusion will occur.

Primary decisions in the database administration

To manage the data that grows consistently, a database manager must use the strategy that will help arrange the incoming information and process it fast. Particularly, the information processing tools, including the ones for arranging data based on its value, the identification of its mean, median, and mode, the basic statistical analysis (e.g., standard deviation identification), etc. must be conducted.

To facilitate data integrity, one should consider the tools such as PeopleSoft (Data integrity tools, 2015) and the related software. In addition, one must consider making security tighter by introducing a system of passwords and ID tools. Last but definitely not least, the basic security principles such as non-disclosure of corporate data to the third parties must be reinforced in the organization.

Reference List

Data integrity tools. (2015). Web.

Topi, H., &Tucker, A. (2014). Computing handbook, third edition: Information systems and information technology (3rd ed.). New York City, New York: CRC Press.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, January 19). Database Administration and Concurrency Management. https://ivypanda.com/essays/database-administration-and-concurrency-management/

Work Cited

"Database Administration and Concurrency Management." IvyPanda, 19 Jan. 2021, ivypanda.com/essays/database-administration-and-concurrency-management/.

References

IvyPanda. (2021) 'Database Administration and Concurrency Management'. 19 January.

References

IvyPanda. 2021. "Database Administration and Concurrency Management." January 19, 2021. https://ivypanda.com/essays/database-administration-and-concurrency-management/.

1. IvyPanda. "Database Administration and Concurrency Management." January 19, 2021. https://ivypanda.com/essays/database-administration-and-concurrency-management/.


Bibliography


IvyPanda. "Database Administration and Concurrency Management." January 19, 2021. https://ivypanda.com/essays/database-administration-and-concurrency-management/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1