Interestingly, when designing a database, much of the hard work is in the planning stages long before physically working with a database management system (DBMS). Attempting to implement a physical design without considering the prerequisite steps will cause one to repeat steps unnecessarily in the end. Each step listed below is necessary for achieving a secure and efficient database that meets the needs of its users with minimal to no issues.
Step 1:
Requirements analysis
Read more ...
While the Bring Your Own Device (BYOD) concept is not new, in recent years, it has become increasingly more popular than it was back in 2005 when the term was first coined, or 2009 when Intel noticed their employees were bringing their own devices to work. The world of technology has improved so much since then, and unfortunately, so has the cybersecurity threats and hacking tactics that are causing a great deal of concern in the higher ed sector.
Read more ...
Welcome to our "Intro to Database Design" series! In this first article, our goal is simply to cover the basics. While you may know much or all of this information, let's consider it a review. Since this is an introduction, it seems best to start from the beginning. As the series progresses, we will begin covering more complex concepts.
Read more ...