Category

Insights
A database is formally defined as any collection of data, or information that is specially organized for rapid search and retrieval by a computer. To help explain how a database is created, I will be referencing firsthand experience in creating a Relational Database. For this example, I will be using a waterfall development model, where...
Read More
The following is a quick post in regards to deadlocking. In particular, we will be discussing Oracle and how to control deadlocking. Oracle has a DBMS that can process database transactions. Deadlocking occurs when two or more transactions wait indefinitely for the other to release the lock on a previously locked data item. It is...
Read More
The following is my personal opinion on Uber and it’s ethics. Feel free to reach out to me directly if you will like to further this discussion. Although businesses exist to earn a profit, they also have fundamental responsibilities to the community. They must make decisions that are for the greater good of the community...
Read More
The following is my outline on how to test out a Security Awareness Program. As well, I have included parts of what I would share in that program in regards to physical and cyber security best practices. Quick Overview of Program Physical Security Lessons/Best Practices. Do not keep doors propped open at any time.Be aware...
Read More
The following is quick  post on Oracle and its Data Mining capabilities. I hope you find this useful when deciding whether or not to use Oracle for this function. Oracle Data MIning (ODM)  is an option that is part of Oracle’s Relational Database Management Systems Enterprise Edition. Oracle primarily specialized in developing and marketing database...
Read More
The following is my personal opinion on the controversial WikiLeaks situation. Considering that its been 7 years since actions have been taken against WikiLeaks, I will be covering my thoughts on whether or not they are justified. Introduction The following case study highlights actions taken by and against WikiLeaks since September 2011. More specifically, the...
Read More
To understand Health Level Seven (HL7), let’s highlight the issues that plague health care IT environments. Let’s start at the beginning, the government rolled out the Meaningful Use Program which financially incentivizes providers to adopt EHR technology and exchange health care data with external organization/applications to create a national connected healthcare information exchange network (HIE)....
Read More
The following is an example of how to transform a business rule into database specifications. The Business Rule, “an employee may have many degrees” can be represented in many ways. On a broad level the rule explains that an employee can have one degree or many(>1) degree. One way to represent this is by using...
Read More
The following is a quick post on a DBMS system named SQL Server. I hope you find this post helpful in better understanding SQL Server and Transactions, as this was a topic that originally confused me. SQL Server uses Transact-SQL to facilitate Distributed Transactions. The distributed transactions started in Transact-SQL have a relative simple structure....
Read More
The following is my personal opinion on potential errors in ER modeling and how to design a database: It is very important to stick to normalization and best practices.  Two common errors in ER modeling include data anomalies and redundant data. Lets assume we have a table named EMPLOYEE_V1 that requires you to input who an...
Read More
1 2 3 4 5 9