104 research outputs found
Methods and apparatus for constructing and implementing a universal extension module for processing objects in a database
Methods and apparatus for providing a multi-tier object-relational database architecture are disclosed. In one illustrative embodiment of the present invention, a multi-tier database architecture comprises an object-relational database engine as a top tier, one or more domain-specific extension modules as a bottom tier, and one or more universal extension modules as a middle tier. The individual extension modules of the bottom tier operationally connect with the one or more universal extension modules which, themselves, operationally connect with the database engine. The domain-specific extension modules preferably provide such functions as search, index, and retrieval services of images, video, audio, time series, web pages, text, XML, spatial data, etc. The domain-specific extension modules may include one or more IBM DB2 extenders, Oracle data cartridges and/or Informix datablades, although other domain-specific extension modules may be used
Developing a Filter Kit System Database: Procedure and Analysis
A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree Master of Science by He Shi on April 30, 2010
Recommended from our members
Handling Unstructured Data Type in DB2 and Oracle
The objective of our work is to determine which mainstream object-relational database management systems (ORDMS) provide convenient facilities for the storage and manipulation of unstructured data objects. These objects, which consist of video, audio, photographs, and even executable code such as Java applets, are becoming readily employed by desktop, network, and Internet applications. Typically, these ORDMSs must store the objects in a manner by which they can be easily accessed, but more importantly, easily processed during either storage or retrieval. Our focus is on two of the ORDMS market leaders: IBM’s DB2 and Oracle. The salient facilities of DB2 and Oracle in handling object types are analyzed, considering their advantages and disadvantages
Intelligent profile analysis graduate entrepreneur (iPage) system using business intelligence technology
The increase use of information in Malaysia Ministry of Higher Education (MOHE) is resulted from the process of huge and complex data in several stages and at different locations.This situation leads to the difficulties of data management and problematic usage for decision
making. Business Intelligence (BI), which is, the process of collecting, analyzing, and transforming data using Data Warehouse (DW) is seen as one of the growing approaches to provide meaningful information.The MOHE is responsible for managing various activities to promote the graduate entrepreneurs to venture into the business and ensure the country has many successful entrepreneurs.Therefore, systematic and accurate
information needs to be available for planning, implementation, and monitoring entrepreneurs' performances.This paper proposes the modeling and designing of the graduate entrepreneur profile application called Intelligent Profile Analysis Graduate Entrepreneur (iPAGE) using BI technologies and supporting by a DW approach.Two main methodologies were used namely: Requirements Centric Operational Data Store (ReCODS) and Rapid Application Development (RAD) to develop this system.The iPAGE system was validated and evaluated by iPAGE users and DW experts.It is used to be a guideline for the development of an entrepreneur information system in the future
ORACLE DATABASE SECURITY
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user accounts that require a login password to be authenticated to access the data.data security, password administration, Oracle HTTP Server, OracleAS, access control
Project Proof: Internet Enabled Process Reengineering at J.D. Edwards & Company
J.D. Edwards is a provider of the new generation of ERP and collaborative commerce solutions. This case study describes the challenges faced internally by the company to upgrade to the latest enterprise software it would sell to the world. Dubbed Project PROOF, the project started in June 2001 and was completed in November 2002. The perspectives of the CIO, the program manager, and other key personnel are presented. The case study highlights the issues that arise in an enterprise software implementation project. In addition, the case touches upon issues of project management, process redesign, and marketing. The case study uses a multimedia format to add richness and detail. Although J.D. Edwards was acquired in 2003, the issues discussed are relevant to current business practices
- …