Database Administration and Concurrency Management Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Feb 9th, 2024

Concurrency control methods used in database management systems

When it comes to defining the best concurrency control methods, one must give credit to the optimistic (validation) one since it prevents a company from facing a deadlock (Topi &Tucker, 2014). The approach in question allows for blocking a transaction from occurring once it fails to pass a certain stage. Dismissing the given strategy, a company may fail to track down the factors that cause transactions to fail and, therefore, overlook some of the major obstacles. Particularly, the distributed locking technique (Topi &Tucker, 2014) should be used as it helps introduce different locks at the existing sites and, thus, make data sharing more flexible. The refusal from DLT and the adoption of the uniform approach make the process of database management less convoluted yet jeopardizes the security of the entire data system.

We will write a custom essay on your topic a custom Essay on Database Administration and Concurrency Management
808 writers online

For instance, the specified method can be used in case a company has several affiliates and, therefore, several databases with the corresponding data. Once the decentralized strategy is used, the members of each department will be able to navigate the data related to their area. Consequently, less confusion will occur.

Primary decisions in the database administration

To manage the data that grows consistently, a database manager must use the strategy that will help arrange the incoming information and process it fast. Particularly, the information processing tools, including the ones for arranging data based on its value, the identification of its mean, median, and mode, the basic statistical analysis (e.g., standard deviation identification), etc. must be conducted.

To facilitate data integrity, one should consider the tools such as PeopleSoft (Data integrity tools, 2015) and the related software. In addition, one must consider making security tighter by introducing a system of passwords and ID tools. Last but definitely not least, the basic security principles such as non-disclosure of corporate data to the third parties must be reinforced in the organization.

Reference List

(2015). Web.

Topi, H., &Tucker, A. (2014). Computing handbook, third edition: Information systems and information technology (3rd ed.). New York City, New York: CRC Press.

Print
Need an custom research paper on Database Administration and Concurrency Management written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, February 9). Database Administration and Concurrency Management. https://ivypanda.com/essays/database-administration-and-concurrency-management/

Work Cited

"Database Administration and Concurrency Management." IvyPanda, 9 Feb. 2024, ivypanda.com/essays/database-administration-and-concurrency-management/.

References

IvyPanda. (2024) 'Database Administration and Concurrency Management'. 9 February.

References

IvyPanda. 2024. "Database Administration and Concurrency Management." February 9, 2024. https://ivypanda.com/essays/database-administration-and-concurrency-management/.

1. IvyPanda. "Database Administration and Concurrency Management." February 9, 2024. https://ivypanda.com/essays/database-administration-and-concurrency-management/.


Bibliography


IvyPanda. "Database Administration and Concurrency Management." February 9, 2024. https://ivypanda.com/essays/database-administration-and-concurrency-management/.

Powered by CiteTotal, free bibliography generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1