Concurrency control methods used in database management systems
When it comes to defining the best concurrency control methods, one must give credit to the optimistic (validation) one since it prevents a company from facing a deadlock (Topi &Tucker, 2014). The approach in question allows for blocking a transaction from occurring once it fails to pass a certain stage. Dismissing the given strategy, a company may fail to track down the factors that cause transactions to fail and, therefore, overlook some of the major obstacles. Particularly, the distributed locking technique (Topi &Tucker, 2014) should be used as it helps introduce different locks at the existing sites and, thus, make data sharing more flexible. The refusal from DLT and the adoption of the uniform approach make the process of database management less convoluted yet jeopardizes the security of the entire data system.
For instance, the specified method can be used in case a company has several affiliates and, therefore, several databases with the corresponding data. Once the decentralized strategy is used, the members of each department will be able to navigate the data related to their area. Consequently, less confusion will occur.
Primary decisions in the database administration
To manage the data that grows consistently, a database manager must use the strategy that will help arrange the incoming information and process it fast. Particularly, the information processing tools, including the ones for arranging data based on its value, the identification of its mean, median, and mode, the basic statistical analysis (e.g., standard deviation identification), etc. must be conducted.
To facilitate data integrity, one should consider the tools such as PeopleSoft (Data integrity tools, 2015) and the related software. In addition, one must consider making security tighter by introducing a system of passwords and ID tools. Last but definitely not least, the basic security principles such as non-disclosure of corporate data to the third parties must be reinforced in the organization.
Reference List
Data integrity tools. (2015). Web.
Topi, H., &Tucker, A. (2014). Computing handbook, third edition: Information systems and information technology (3rd ed.). New York City, New York: CRC Press.