All about DatabasesRate:


Table of Contents
All about Databases
Tags: Database, Computer, Technology

In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and analyze the data.

The DBMS additionally encompasses the core facilities provided to administer the database. The total of the database, the DBMS, and the associated applications can be referred to as a database system. The term "database" is often used loosely to refer to any of the DBMS, the database system, or an application associated with the database.

Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases spans formal techniques and practical considerations, including data modeling, efficient data representation and storage, query languages, security, and privacy of sensitive data, and distributed computing issues, including supporting concurrent access and fault tolerance.

Computer scientists may classify database management systems according to the database models that they support. Relational databases became dominant in the 1980s. These model data are rows and columns in a series of tables, and the vast majority use SQL for writing and querying data. In the 2000s, non-relational databases became popular, collectively called NoSQL, because they use different query languages.

Terminology and Overview

Formally, a "database" refers to a set of related data accessed through the use of a "database management system" (DBMS), which is an integrated set of computer software that allows users to interact with one or more databases and provides access to all the data contained in the database (although restrictions may exist that limit access to a particular data). The DBMS provides various functions that allow entry, storage, and retrieval of large quantities of information and provides ways to manage how that information is organized.

Because of the close relationship between them, the term "database" is often used casually to refer to both a database and the DBMS used to manipulate it.

Outside the world of professional information technology, the term database is often used to refer to any collection of related data (such as a spreadsheet or a card index) as size and usage requirements typically necessitate the use of a database management system.

Existing DBMSs provide various functions that allow the management of a database and its data which can be classified into four main functional groups;

  1. Data Definition: Creation, modification, and removal of definitions that detail how the data is to be organized.
  2. Update: Insertion, modification, and deletion of the data itself.
  3. Retrieval: Selecting data according to specified criteria (e.g., a query, a position in a hierarchy, or a position about other data) and providing that data either directly to the user or making it available for further processing by the database itself or by other applications. The retrieved data may be made available in a more or less direct form without modification, as it is stored in the database, or in a new form obtained by altering it or combining it with existing data from the database.
  4. Administration: Registering and monitoring users, enforcing data security, monitoring performance, maintaining data integrity, dealing with concurrency control, and recovering information that has been corrupted by some event such as unexpected system failure.

Both the database and its DBMS conform to the principles of a particular database model. Database system refers to the database model, database management system, and database.

Physically, database servers are dedicated computers that hold the actual databases and run only the DBMS and related software. Database servers are usually multiprocessor computers, with generous memory and RAID disk arrays used for stable storage. Hardware database accelerators, connected to one or more servers via a high-speed channel are also used in large-volume transaction processing environments. DBMSs are found at the heart of most database applications. DBMSs may be built around a custom multitasking kernel with built-in networking support, but modern DBMSs typically rely on a standard operating system to provide these functions.

Databases and DBMS can be categorized according to the database model that they support (such as relational or XML), the type of computer they run on them (from a server cluster to a mobile phone), the query languages used to access the database (such as SQL or XQuery), and their internal engineering, which affects performance, scalability, resilience, and security.

History

The sizes, capabilities, and performance of databases and their respective DBMSs have grown in orders of magnitude. These performance increases were enabled by the technology progress in the areas of processors, computer memory, computer storage, and computer networks. The concept of a database was made possible by the emergence of direct access storage media such as magnetic discs, which became widely available in the mid-1960s; earlier systems relied on sequential storage of data on magnetic tape. The subsequent development of database technology can be divided into three eras based on data model or structure; navigational, SQL or relational, and post-relational.

The two main early navigational data models were the hierarchical model and the CODASYL model (network model). These were characterized by the use of pointers (often physical disk addresses) to follow relationships from one record to another.

The relational model, first proposed in 1970 by Edgar F. Codd, departed from this tradition by insisting that applications should search for data by content, rather than by following links. The relational model employs a set of ledger-style tables, each used for a different type of entity. Only in the mid-1980s did computing hardware become powerful enough to allow the wide deployment of relational systems. By the early 1990s, however, relational systems dominated all large-scale data processing applications, and as of 2018 they remain dominant: IBM Db2, Oracle, MySQL, and Microsoft SQL are the most searched DBMS. The dominant database language, standardized SQL for the relational model, has influenced database languages for other data models.

Object databases were developed in the 1980s to overcome the inconvenience of object-relational impedance mismatch, which led to the coining of the term "post-relational" and also the development of hybrid object-relational databases.

The next generation of post-relational databases in the late 2000s became known as NoSQL databases, introducing fast key-value stores and document-oriented databases. A competing "next generation" known as NewSQL databases attempted new implementations that retained the relational/SQL model while aiming to match the high performance of NoSQL compared to commercially available relational DBMS.

Use Cases

Databases are used to support the internal operations of organizations and to underpin online interactions with customers and suppliers. Databases are used to hold information and more specialized data, such as engineering data or economic models. Examples include computerized library systems, flight reservation systems, computerized parts inventory systems, and many content management systems that store websites as collections of webpages in a database.

Author: Mikhail

No comments yet.

You must be logged in to leave a comment. Login here


Thread Back to Threads Thread

You May Also Like

What is Phishing?
Tags: Phishing, Social Engineering

Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransom ware.
Why Reporting Cyber Crime is Crucial for Everyone?
Tags: Cyber Crime, Cyber Security, Cybersecurity

In today's interconnected world, cybercrime has become one of the most pressing threats to individuals, businesses, and governments. Despite the growing frequency and severity of cyber attacks, many organizations hesitate to report such incidents. This reluctance is often rooted in the fear of reputational damage, particularly among shareholders and clients, and concerns over the exposure of sensitive business data. However, choosing not to report a cyber crime can have far more serious consequences in the long run.
What is a Link Rot?
Tags: Link Rot, Website Link Rot

Link Rot, also called link death, link breaking, or reference rot, is the phenomenon of hyperlinks tending over time to cease to point to their originally targeted file, web page, or server due to that resource being relocated to a new address or becoming permanently unavailable. A link that no longer points to its target, often called a broken, dead, or orphaned link, is a specific form of dangling pointer.
Cracking the Code: Why 15 and 21 Are (Almost) Special in Cryptography
Tags: Cryptography

Recently, I came across an interesting discussion between cryptography experts Job Callas and Stephan Neuhaus. They were talking about certain special numbers - specifically 15 and 21 and how they behave in binary (the language of 1s and 0s that computer use).