Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

School of Computer & Information Science

2013

Articles 1 - 8 of 8

Full-Text Articles in Computer Sciences

Evaluation Of Sql Performance Tuning Features In Oracle Database Software, Katarzyna Marta Dobies Aug 2013

Evaluation Of Sql Performance Tuning Features In Oracle Database Software, Katarzyna Marta Dobies

Regis University Student Publications (comprehensive collection)

Timely access to data is one of the most important requirements of database management systems. Having access to data in acceptable time is crucial for efficient decision making. Tuning inefficient SQL is one of the most important elements of enhancing performance of databases. With growing repositories and complexity of underlying data management systems, maintaining decent levels of performance and tuning has become a complicated task. DBMS providers acknowledge this tendency and developed tools and features that simplify the process. DBAs and developers have to make use of these tools in the attempt to provide their companies with stable and efficient …


Oracle Cost Based Optimizer Correlations, Robert Apple Aug 2013

Oracle Cost Based Optimizer Correlations, Robert Apple

Regis University Student Publications (comprehensive collection)

Database systems use optimizers on queries to select execution pathways that are supposed to provide optimal performance. The Oracle database version of this technology is called the Cost Based Optimizer (CBO). Researchers have studied whether Oracle optimizer estimates could be correlated to execution speeds with a high degree of confidence, but have found that correlating optimizer cost estimates with actual execution speed to be problematic and unreliable. If possible, however, such correlations would be helpful to developers who are tasked with query creation and optimization. Although much has been written on databases, the academic literature on optimizers was sparse. To …


The Use Of Vulnerability Assessments: A Survey, Charles D. Lybrand Jul 2013

The Use Of Vulnerability Assessments: A Survey, Charles D. Lybrand

Regis University Student Publications (comprehensive collection)

One of the most significant challenges faced by senior business and technology managers is securing organizational data in light of rising threats and compliance requirements. The use of vulnerability assessments has stood out as one strategy to help protect against malicious computer attacks. Vulnerability assessments are conducted to identify security holes within information systems, including networks, servers, and applications. These assessments can be performed by an organization's internal staff or outsourced to a third-party vendor. Outsourcing is especially important for small organizations who typically do not have the resources or expertise to conduct their own vulnerability assessment. This thesis will …


A Study Of Mongodb And Oracle In An E-Commerce Environment, Aaron Ploetz Jul 2013

A Study Of Mongodb And Oracle In An E-Commerce Environment, Aaron Ploetz

Regis University Student Publications (comprehensive collection)

As worldwide e-commerce expands, businesses continue to look for better ways to meet their evolving needs with web solutions that scale and perform adequately. Several online retailers have been able to address scaling challenges through the implementation of NoSQL databases. While architecturally different from their relational database counterparts, NoSQL databases typically achieve performance gains by relaxing one or more of the essential transaction processing attributes of atomicity, consistency, isolation, and durability (ACID). As with any emerging technology, there are both critics and supporters of NoSQL databases. The detractors claim that NoSQL is not safe and is at a greater risk …


Development Of An Api As A Solution To Data Insularity Amongst Dietary-Need Applications, Raphael Lapuma Apr 2013

Development Of An Api As A Solution To Data Insularity Amongst Dietary-Need Applications, Raphael Lapuma

Regis University Student Publications (comprehensive collection)

When multiple competing applications in the same field use only their own sets of user-generated review data and do not collaborate with other applications, data is used in isolation. This factor, which the author will refer to as "data insularity," segregates each application's community of users from other applications' communities, thus creating a limited and fragmented set of data, which discourages the creation of new applications in the industry, and adversely affects the end user. This study will propose a prototype API for applications in the restaurant industry as a solution to the limited and insular use of data amongst …


Agile And Evm For The Dod: A Review Of The Challenges And A New Approach To Solve Them, Roberta Winterowd Apr 2013

Agile And Evm For The Dod: A Review Of The Challenges And A New Approach To Solve Them, Roberta Winterowd

Regis University Student Publications (comprehensive collection)

Department of Defense (DoD) acquisitions must improve program performance while working within budgetary constraints. The DoD community shows an interest in utilizing Agile methodologies, but struggles to reap Agile's benefits. They encountered challenges including the historically built up processes that enforce heavy-weight oversight; the outdated, manufacturing focused Work Breakdown Structures (WBS) provided in DoD Handbook: Work Breakdown Structures (WBS) for Defense Material Items (MIL-STD-881C); and the inability of the traditional waterfall based processes to accommodate iterative development. The author used the scientific method to review the documented issues encountered when using Agile on a DoD program within the constraints of …


Lean Principles:: Can Proven Manufacturing Techniques Benefit An Information Technology Organization?, Erik D. Kim Feb 2013

Lean Principles:: Can Proven Manufacturing Techniques Benefit An Information Technology Organization?, Erik D. Kim

Regis University Student Publications (comprehensive collection)

The benefits of Lean Principles have been reaped in manufacturing for many years and have been seen recently in other verticals. A comprehensive review of the scientific literature exposed that within the information technology field, Lean Principles remains relatively unknown or used. As corporate senior management seek to save costs, information technology needs to provide clear and concise guidance on how to maximize production efficiencies while minimizing costs. If a company cannot leverage information technology properly, staffing and budget cuts are likely. This paper discusses the potential benefits for information technology organizations to utilize Lean Principles. A case study revealed …


Ssd Flash Drives Used To Improve Performance With Clarity Data Warehouse, Douglas Ervin Jan 2013

Ssd Flash Drives Used To Improve Performance With Clarity Data Warehouse, Douglas Ervin

Regis University Student Publications (comprehensive collection)

Since the introduction of solid-state devices (SSD), both storage area network (SAN) administrators and database administrators (DBA) have imagined the performance gains promised by replacing hard disk drives (HDD). The initial testing in the laboratory did not promise those gains in the real world. The SSD vendors worked between 2007 and 2010 to improve performance, which in industry standard tests showed steady progress. Despite the gains in the laboratory, there were few examples of real world usage particularly in the field of data warehousing. The process of extracting, transforming and loading (ETL) places extreme loads on the ability of the …