Why War?
why-war.com
This site needs $50/month to operate. Please help us by donating $5.

Database

Sort By:  
  • Wisconsin Backs Out of Matrix Database Over Privacy Issues (March 10, 2004)
    ... Tuesday from a system giving law enforcement access to a large, organized database of personal information called the Matrix that some fear would trod on pri...
  • FBI Plans Counterterrorism Database (September 17, 2003)
    ...sensitive counterterror information, unveiled plans yesterday for a master database of "known and suspected terrorists" that would be used in background check...
  • The Spy-on-Every-Street-Corner Corps (July 18, 2002)
    ...Justice Department, where all that information will be stored in a central database – yet another database containing names of persons who have not been charg...
  • Human-Rights Group to Estimate Civilians Killed in War (February 8, 2002)
    ...ofessor has made headlines -- and drawn sharp criticism -- by publishing a database he says details thousands of civilian casualties caused by the air war. ...
  • Students Fight E-Vote Firm (October 21, 2003)
    ... Among the revelations in the memos was news that the Microsoft Access database used by the Diebold system to count votes was not protected by a password....
  • Chilly Response to 'Patriot II' (February 12, 2003)
    ...powers. Among other measures, it calls for the creation of a terrorist DNA database and allows the attorney general to revoke citizenship of those who provide...
  • Senators' Stocks Beat the Market by 12 Percent (February 25, 2004)
    ...comparison. The study took eight years to complete because there was no database of information and the documents had to be gathered and examined manually....
  • You Are a Suspect (November 14, 2002)
    ...nto what the Defense Department describes as "a virtual, centralized grand database." To this computerized dossier on your private life from commercial sou...
  • US Wants DNA of All Afghan Detainees (March 3, 2002)
    ...anistan and Cuba, government officials said. The officials said the DNA database could help in tracking terrorism suspects in the future. They said that wo...
  • Ashcroft Defends Plan for National Hotline on Terrorism (July 25, 2002)
    ...f concern by insisting that the TIPS program would not maintain a computer database of reports, but would simply forward tips it received to other agencies. S...
  • Progressive Domestic Think-Tanks See Drop (August 1, 2003)
    ...papers and broadcast transcripts, according to a search of the Nexis media database. This is an 8 percent decrease from 2001, bucking the trend of increasing...
  • Elections Chief Tightens Vote Security (September 25, 2003)
    ... Access has been used a number of times to make "end runs" around the GEMS database. "King County is famous for it," one employee wrote in 2001. Logan sai...
  • Alien Nation (January 13, 2003)
    ...or she will also be placed on the National Crime Information Center (NCIC) database, alongside murderers and rapists. Police routinely check anyone they stop...
  • U.S. Expands Controversial Border Program (April 4, 2004)
    ...fficers will be checked against terrorist watch lists and an international database of criminals. Canada and the U.S. have separate rules governing cross-b...
  • Privacy Fears Erode Support for 'MATRIX' (March 14, 2004)
    ...zations, which found Orwellian overtones in the collection and analysis of database information that would include people who have committed no crime. The Ame...
  • 1–15 of 53 records found matching your criteria.

    [1] [2] [3] [4] Next

    Database

    From Wikipedia, the free encyclopedia.

    A database is an information set with a regular structure. A database is usually but not necessarily stored in some machine readable format accessed by a computer. There are a wide variety of databases, from simple tables stored in a single file to very large databases with many millions of records, stored in rooms full of disk drives.

    Databases resembling modern versions were first developed in the 1960s. A pioneer in the field was Charles Bachman.

    One way of classifying databases is by the programming model associated with the database. Several models have been in wide use for some time. Historically, the hierarchical model was implemented first, then the network model, then the relational model and flat models reached their zeniths.

    Table of contents
    1 Database models
    2 Implementations and indexing
    3 Mapping objects into databases
    4 Applications of databases
    4.1 Database application
    5 Transactions and concurrency
    6 References

    Database models

    The flat (or table) model consists of a single, two-dimensional array of data elements, where all members of a given column are assumed to be similar values, and all members of a row are assumed to be related to one another. For instance, columns for name and password might be used as a part of a system security database. Each row would have the specific password associated with a specific user. Columns of the table often have a type associated with them, defining them as character data, date or time information, integers, or floating point numbers. This model is the basis of the spreadsheet.

    The network model allows multiple tables to be used together though the use of pointers (or references). Some columns contain pointers to different tables instead of data. Thus, the tables are related by references, which can be viewed as a network structure. A particular subset of the network model, the hierarchical model, limits the relationships to a tree structure, instead of the more general directed graph structure implied by the full network model.

    Relational databases also consist of multiple database tables. Unlike the hierarchical and network models, there are no explicit pointers; in theory, columns of any type may be used to create an ad-hoc relationship between two or more tables. Relational databases allow users (or, more often, programmers) to write queries that were not anticipated by the database designer. As a result, relational databases can be used by multiple applications in ways the original designers did not foresee, which is especially important for databases that might be used for decades. This has made relational databases very popular with businesses.

    The relational model is a mathematical theory developed by Ted Codd to describe how relational databases should work. Although this theory is the basis for relational database software, very few databases actually follow the model very closely and almost all have features contradicting the theory.

    Implementations and indexing

    All of these kinds of database can take advantage of indexing to increase their speed. An index is a sorted list of the contents of some particular table column, with pointers to the row associated with the value. An index allows a set of table rows matching some criterion to be located quickly. Various methods of indexing are commonly used, including b-trees, hashes, and linked lists are all common indexing techniques.

    A relational DBMS has the advantage that indexes can be created or dropped without changing existing applications, because applications don't use the indexes directly. Instead, the database software decides on behalf of the application which indexes to use. The database chooses between many different strategies based on which one it estimates will run the fastest.

    Mapping objects into databases

    In recent years, the object-oriented paradigm has been applied to databases as well, creating a new programming model known as object databases. These databases attempt to overcome some of the difficulties of using objects with the relational model. An object-oriented program allows objects of the same type to have different implementations and behave differently, so long as they have the same interface (polymorphism). This doesn't fit well with a relational database where all rows in a table have exactly the same columns and the columns are directly accessible.

    A variety of ways have been tried for storing objects in a database, but there is little consensus on how this should be done. Some ways of implementing object databases appear to undo the benefits of relational model by introducing pointers and making ad-hoc queries more difficult. As a result, object databases tend to be used for specialized applications and general-purpose object databases have not been very popular commercially. Instead, objects are often stored in relational databases using complicated mapping software. At the same time, relational database software vendors have added features to allow objects to be stored more conveniently, drifting even further away from the relational model.

    Applications of databases

    Databases are used in many applications, spanning virtually the entire range of computer software. Databases are the preferred method of storage for large multiuser applications, where coordination between many users is needed. Even individual users find them convenient, though, and many electronic mail programs and personal organizers are based on standard database technology.

    Database application

    A database application is a type of computer application dedicated to managing a database. Database applications span a huge variety of needs and purposes, from small user-oriented tools such as an address book, to huge enterprise-wide systems for tasks like accounting.

    The term "database application" usually refers to software providing a user interface to a database. The software that actually manages the data is usually called a database management system (DBMS) or (if it is embedded) a database engine.

    Examples of database applications include Microsoft Access, dBASE, FileMaker and (to some degree) HyperCard.

    In March, 2004, AMR Research (as cited in the CNET News.com article listed in the "References" section) had predicted that open source database applications would come into wide acceptance in 2006.

    Transactions and concurrency

    In addition to their data model, most practical databases attempt to enforce a database transaction model that has desirable data integrity properties. Ideally, the database software should enforce the ACID rules:

    • Atomicity - either all or no operations are completed. (Transactions that can't be finished must be completely undone.)
    • Consistency - all transactions must leave the database in consistent state.
    • Isolation - transactions can't interfere with each other's work and incomplete work isn't visible to other transactions.
    • Durability - successful transactions must persist through crashes.

    In practice, many DBMS's allow some of these rules to be relaxed for better performance.

    Concurrency control is a method used to ensure transactions are executed in a safe manner and follows the ACID rules. The DBMS must be able to ensure only serializable, recoverable schedules are allowed, and that no actions of committed transactions are lost while undoing aborted transactions.

    See also:

    • CDDB
    • Client-Server
    • Database management system
    • Database normalization
    • Distributed database
    • Hierarchic Database
    • Internet Movie Database
    • Java Database Connectivity
    • Key field
    • OLAP
    • Relational model
    • SQL (Structured Query Language)
    • Object database
    • Important publications in databases
    • Software engineering and List of software engineering topics

    References

    • CNET News.com article, An


This description is from Wikipedia. It is available under the terms of the GNU Free Documentation License.