Technical Blog Articles

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Interestingly, when designing a database, much of the hard work is in the planning stages long before physically working with a database management system (DBMS). Attempting to implement a physical design without considering the prerequisite steps will cause one to repeat steps unnecessarily in the end. Each step listed below is necessary for achieving a secure and efficient database that meets the needs of its users with minimal to no issues.

 

Step 1:

Requirements analysis

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

While the Bring Your Own Device (BYOD) concept is not new, in recent years, it has become increasingly more popular than it was back in 2005 when the term was first coined, or 2009 when Intel noticed their employees were bringing their own devices to work. The world of technology has improved so much since then, and unfortunately, so has the cybersecurity threats and hacking tactics that are causing a great deal of concern in the higher ed sector. 

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Welcome to our "Intro to Database Design" series! In this first article, our goal is simply to cover the basics. While you may know much or all of this information, let's consider it a review. Since this is an introduction, it seems best to start from the beginning. As the series progresses, we will begin covering more complex concepts.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Depending on your level of expertise, designing a database can be straightforward and relatively easy, or it can be quite complicated and intimidating. Undoubtedly, a certain skill level is required to master all the intricate details of the more complex designs. The ultimate goal is to design an efficient, secure, and highly functional database that meets the needs of each user.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

The recent pandemic has played an enormous role in the undeniably significant rise in cyber-attacks directed towards higher educational institutions. The speed at which students and staff began to work from home was so rapid that there was not enough time to execute safe and efficient systems properly. When we reviewed the statistics, there was a tremendous increase in cybercrime across all industries in just the past year alone. The education and research sectors are by far the most sought-after industries. In 2021, there was an average of nearly 6,500 attacks per organization monthly. That equals more than 200 attempted threats each day.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

The days of higher ed students standing in long lines waiting to receive academic records may soon come to an end. The use of blockchain in higher education completely reshapes the process for students to receive and share their documents with individuals and organizations of their choosing. Blockchain has the potential to put an end to tedious prehistoric processes and transform them into ones where students no longer need to leave home to view their academic records.