deodatabase

Tuesday, July 29, 2008

Neogeography

Neogeography literally means "new geography", and is commonly applied to the usage of geographical techniques and tools used for personal and community activities or for utilization by a non-expert group of users. Application domains of neogeography are typically not formal or analytical.

The term and field owes much of its inspiration to the Locative media movement that sought to expand the use of location-based technologies to personal expression and society.

Traditional GIS Geographic Information Systems historically have developed tools and techniques targeted towards formal applications that require precision and accuracy. By contrast, Neogeography tends to apply to the areas of approachable, colloquial applications. The two realms can have overlap as the same problems are presented to different sets of users: experts and non-experts.

Monday, July 21, 2008

Database integrity

Database integrity ensures that data entered into the database is accurate, valid, and consistent. Any applicable integrity constraints and data validation rules must be satisfied before permitting a change to the database.

Three basic types of database integrity constraints are:

* Entity integrity, allowing no two rows to have the same identity within a table.
* Domain integrity, restricting data to predefined data types, e.g.: dates.
* Referential integrity, requiring the existence of a related row in another table, e.g. a customer for a given customer ID.

Monday, July 14, 2008

Navigational database

Navigational databases are characterized by the fact that objects in the database are found primarily by following references from other objects. Traditionally navigational interfaces are procedural, though one could characterize some modern systems like XPath as being simultaneously navigational and declarative.

Navigational access is traditionally associated with the network model and hierarchical model of database interfaces and have evolved into Set-oriented systems . Navigational techniques use "pointers" and "paths" to navigate among data records (also known as "nodes"). This is in contrast to the relational model (implemented in relational databases), which strives to use "declarative" or logic programming techniques in which you ask the system for what you want instead of how to navigate to it.

For example, to give directions to a house, the navigational approach would resemble something like, "Get on highway 25 for 8 miles, turn onto Horse Road, left at the red barn, then stop at the 3rd house down the road".

Tuesday, July 08, 2008

Data profiling

Data profiling is the process of examining the data available in an existing data source (e.g. a database or a file) and collecting statistics and information about that data. The purpose of these statistics may be to:

1. find out whether existing data can easily be used for other purposes
2. give metrics on data quality including whether the data conforms to company standards
3. assess the risk involved in integrating data for new applications, including the challenges of joins
4. track data quality
5. assess whether metadata accurately describes the actual values in the source database
6. understanding data challenges early in any data intensive project, so that late project surprises are avoided. Finding data problems late in the project can incur time delays and project cost overruns.
7. have an enterprise view of all data, for uses such as Master Data Management where key data is needed, or Data governance for improving data quality

Wednesday, July 02, 2008

Grayware

Grayware (or greyware) is a general term sometimes used as a classification for applications that behave in a manner that is annoying or undesirable, and yet less serious or troublesome than malware. Grayware encompasses spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses that are designed to harm the performance of computers on your network. The term has been in use since at least as early as September 2004.

Grayware refers to applications or files that are not classified as viruses or trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization. Often grayware performs a variety of undesired actions such as irritating users with pop-up windows, tracking user habits and unnecessarily exposing computer vulnerabilities to attack.