Project Management Tricks
Home | BPM | BPM Tools | BPM Sol | Tech | Pro | Management |
Project Management
Project Management Solution Some people are confused on the difference between project management and the project lifecycle. It takes both types of work to complete a project successfully. The general difference is that project management is used to define, plan, control, monitor and close the project. The work associated with actually building the project deliverables is accomplished . Harden the security lifecycle of Windows systems Hardening Windows systems is not a one-time operation, but a continuous process of monitoring and appropriately adjusting security measures. This sample chapter, taken from McGraw-Hill's Hacking Exposed Windows Server 2003, outlines a seven-stage, security lifecycle for Windows systems. The lifecycle covers, business continuity planning, security policy generation, hardened operating system.
Database Management System
DBMS is a complex set of software programs that controls the organization, storage and retrieval of data in a database. A DBMS includes A modeling language to define the schema(relational model) of each database hosted in the DBMS, according to the DBMS data model. The three most common organizations are the hierarchical, network and relational models. A database management system may provide one, two or all three methods. Inverted lists and other methods are also used. The most suitable structure depends on the application and on the transaction rate and the number of inquiries that will be made. The dominant model in use today is the ad hoc one embedded in SQL, a corruption of the relational model by violating several of its fundamental principles. Many DBMSs also support the Open Database Connectivity API that supports a standard way for programmers to access the DBMS. Data structures (fields, records and files) optimized to deal with very large amounts of data stored on a permanent data storage device (which implies very slow access compared to volatile main memory). A database query language and report writer to allow users to interactively interrogate the database, analyse its data and update it according to the users privileges on data. It also controls the security of the database. Data security prevents unauthorised users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However, it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organisation. These controls are only available when a set of application programs are customised for each data entry and updating function. A transaction mechanism, that ideally would guarantee the ACID properties, in order to ensure data integrity, despite concurrent user accesses (concurrency control), and faults (fault tolerance). It also maintains the integrity of the data in the database. The DBMS can maintain the integrity of the database by not allowing more than one user to update the same record at the same time. The DBMS can help prevent duplicate records via unique index constraints; for example, no two customers with the same customer numbers (key fields) can be entered into the database. See ACID properties for more information (Redundancy avoidance). The DBMS accepts requests for data from the application program and instructs the operating system to transfer the appropriate data. When a DBMS is used, information systems can be changed much more easily as the organization's information requirements change. New categories of data can be added to the database without disruption to the existing system.
Relational Database Management system (RDBMS)
A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model as introduced by E. F. Codd . Relational databases are the most common kind of database in use today (assuming one does not count a file system as a database).[citation needed] A short definition of a RDBMS may be a DBMS in which data is stored in the form of tables and the relationship among the data is also stored in the form of tables.Here are criticisms and complaints that can be found with regard to current RDBMS: Vendors don't explore optional query languages outside of SQL. Many feel that SQL needs an update or overhaul, being about 30 years old and not being relational in the first place[1]. They are usually statically-typed. Some feel that dynamically-typed or optional columns may make RDBMS more useful for prototyping or for domains where being nimble in a market is important. (Optional columns are implemented by returning null or blank for columns not defined in a given record.) Over-ubiquity — Not all data models require a relational data store, but most developers will pick one up and run with it anyway. As a result, most non-relational DBMS have been starved of development time and innovation. In this paper the design criteria and the overall organization of MORIS, a new general purpose data management system, are illustrated. The system is based on a relational model of data, in which the data base is viewed as a collection of time varying relations of assorted degrees. The capabilities offered by this model are discussed. The architecture of the system is illustrated, which is designed to provide independence of application programs from growths in data types and changes in data representation, convertibility of data among different storage structures, and ability to provide solutions to a wide variety of unanticipated user's problems in fast and uniform retrieval times. The relational model allows the formal definition of an user oriented language, based on applied predicate calculus. The capabilities of this language for retrieving any information which is, implicitly or explicitly, represented in the data base, are discussed.
______________________________________________________