...head: DATABASE AND DATA WAREHOUSING DESIGN Database and Data Warehousing Design Yolanda McCollum Dr. Constance D. Blanson CIS499: Information Systems Capstone February 11, 2014 Database and Data Warehousing Design Why does one need data warehousing? According to Total Metrics (2013): 1. The prime purpose of a Data Warehouse is to store, in one system, data and information that originates from multiple applications within, or across, organizations. The data may be stored ‘as received’ from the source application, or it may be processed upon input to validate, translate, aggregate, or derive new data/information. 2. Most of the data load functions are processed in batch. There are few on-line data maintenance functions. The on-line functions that do exist tend to update the reference files and data translation tables. 3. A database alone does not constitute a Data Warehouse system. At a minimum, a Data Warehouse system must include the database and corresponding load functions. Data reporting functions are optional. They may, or may not be an integral part of the Data Warehouse system. 4. The prime purpose of storing the data is to support the information reporting requirements of an organization i.e. multiple users and multiple applications. 5. The Data Warehouse may, or may not, provide the required reporting functions. In some cases, external applications access the Data Warehouse files to generate their own reports and queries. 6. Data Warehouse functions...
Words: 880 - Pages: 4
...Implications of Big Data for the design, implementation and use of enterprise-level information systems in Defense While technology rapidly advances and information becomes a strategic asset, Big Data arouses the demand of politicians and military leaders to make use of possible information advantages to allegedly better support the military mission (DOD, 2010). However, the defense sector is still struggling with the implementation of adequate enterprise-level information systems. Therefore, militaries have to assess the necessity of using Big Data within the different business processes, and they have to ensure that the current implementation of enterprise-level information systems remains adaptable and scalable for future business needs. The amount of data is continuously on the rise due to the rapid growth of mobile devices and applications, smart sensors and devices, cloud computing solutions, and […] portals (“Impact,” 2013). Also, the capability to analyze and to correlate structured with unstructured data will enhance. But militaries must avoid getting distracted from implementing a good information management system that serves current business needs, rather than trying to rapidly dominate Big Data. Instead, the success of todays mission has to gain center stage. Thus, one has to focus on three principles. First: One has to act now but also has to keep in mind that there has to be a transition from information management to Big Date in the future, as Big Data will affect more...
Words: 647 - Pages: 3
...Data Design Methods Introduction Many organizations and companies rely on databases to run their operations and achieve competitive advantage. Database design refers to the different parts of the design of an overall database system. It can be thought of as the logical data structures used to store data, and the forms and queries used as part of the overall database application within the database management system (Wikipedia.org). The paper focuses on database design methods and steps that can be taken to achieve a good design structure that avoids redundancy, duplicate data or the absence of required data. The need to understand database models Databases are important to the organizational setting. Databases allow organizations to share data across multiple applications and systems. Organizations build several databases each one sharing data with several information systems. This is because it is almost impractical to build one database to meet an entire organization’s needs. Therefore data design is critical to the consistency, integrity and accuracy of the data in a database. A database that is improperly designed will make it difficult to retrieve certain types of information. Besides, there is the risk that searches will produce inaccurate results or information that may have potential damaging effects on a company's bottom line. Inaccurate database may also affect the daily operations of a business and its future direction. A good database addresses the informational...
Words: 1407 - Pages: 6
...my credit information and my banking transaction or online purchases.The way this pizza shop is handling personal information can lead to information security breaches anytime and is unethical. Information security breaches may cause real harm and distress to the individuals they affect such as serious embarrassment or inconvenience, identity fraud, lives may even be put at risk. Even if privacy is not in itself a fundamental right, it is necessary to protect other fundamental rights. 3) What role does information security play in this scenario? Information Security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. For the scenario , in the above video I feel that different Information security tools must be used by the company to...
Words: 354 - Pages: 2
...Module code: BSS002-6 Module Name: Business Data Analysis Submission: 30 November, 2012 I my class I learn how to simulate data to solve a problem. I learn to use excel and some function in it these are =SUM() = RAND() =AVERAGE() =STDV() =RANDINV() =VLOOKUP() and few more . These are widely used function when I simulated data in excel. In task 1 I find out how to calculate or forecast how much card should we print. I use a random variable with =RAND( function and use =VLOOKUP() function to find out demand from discreet variable called cumulative probabilities. This is discrete because we find out the range by frequency distribution. Then I use if function to calculate disposable cost with =IF (Demand>Production,(Demand-Production)*Disposable cost, 0). This function works with logical criteria. It says that, if demand is greater than production then disposable cost will be (Demand-Production)*Disposable cost, if not then “0”. Then I calculated profit. Then I simulated 1000 trial with 4 types demand to find out with demand will give us maximum profit and this was $40000. If we print $40000 cards then we can make profit of $57758 which is higher than other. Then we use DATA ANALYSIS add-in to simulate descriptive statistic. From here we can answer question no 2 also. If you print 20000 cards then will make profit of 46178 which is less than what can we make in 40000 printed cards. In here simulated demand is uncertain variable when is used for forecasting...
Words: 671 - Pages: 3
...dSoftware Design Document (SDD) Template Software design is a process by which the software requirements are translated into a representation of software components, interfaces, and data necessary for the implementation phase. The SDD shows how the software system will be structured to satisfy the requirements. It is the primary reference for code development and, therefore, it must contain all the information required by a programmer to write code. The SDD is performed in two stages. The first is a preliminary design in which the overall system architecture and data architecture is defined. In the second stage, i.e. the detailed design stage, more detailed data structures are defined and algorithms are developed for the defined architecture. This template is an annotated outline for a software design document adapted from the IEEE Recommended Practice for Software Design Descriptions. The IEEE Recommended Practice for Software Design Descriptions have been reduced in order to simplify this assignment while still retaining the main components and providing a general idea of a project definition report. For your 1 own information, please refer to IEEE Std 10161998 for the full IEEE Recommended Practice for Software Design Descriptions. 1 http://www.cs.concordia.ca/~ormandj/comp354/2003/Project/ieeeSDD.pdf (Team Name) (Project Title) ...
Words: 1105 - Pages: 5
...Park Design Guidelines & Data Province of British Columbia Ministry of Environment Lands and Parks A NATURAL LANDSCAPE ARCHITECTURE FOR BRITISH COLUMBIA’S PROVINCIAL PARKS BC PARKS: PARK DESIGN GUIDELINES & DATA Overview Simplicity in design and restraint in construction creates park facilities suited to what attracts visitors in the first place – recreation in the natural park landscape. q The aim of Park Design Guidelines & Data is to help BC Parks staff use their park expertise to produce appropriate facility landscapes. These guidelines identify design criteria and planning processes for BC Parks staff to provide sustainable, appropriate park recreation facilities. They promote facility design that requires the least visible development. q A design approach to visitor facilities is defined that: Recognizing the facilities are an integral part of a park means reducing the impact of use and basing planning and design decisions on local and regional considerations – for the park environment’s long term health. Maintaining natural park landscapes and environments will help ensure the quality of visitor experiences now and in the future. At neighbouring Bromley Rock Provincial Park and Stemwinder Provincial Park, illustrated left, natural site elements create facilities that blend into the natural park landscapes. These examples show the careful expenditure of resources and the thoughtful use of native materials...
Words: 32924 - Pages: 132
...The optimum design selection for this project is design 03. This design was selected by considering several factors. The first factor which was considered is the complexity of the circuit design. As there are two processors the work load is divided and therefore error percentage can is reduced. Sensor interfacing is carried out with the microcontroller and the GSM and PC interfacing is done using the arduino. If an error occur in the system it will be easily troubleshoot as the system is virtually divided and three different program codes are being used. When comparing with the other two designs the work load will more on the processor therefore it will affect the accuracy and the effectiveness of those system in the long run. In data transmission design 01 has used a RF for wireless communication, and the design 02 has used a Bluetooth device for its wireless data communication. As the system is wireless there will be various interferences from other equipment, result in errors in the system. And if this system is implemented in a small nursing home or a hospital, the radio frequency signals may be interfere with other medical equipment which will cause instability in this system as well as other equipment too....
Words: 511 - Pages: 3
...User Understanding User research was performed to understand how the users work with the application. Users from medical practice (pathologist and physician) were recruited for user analysis through contextual inquiry. Our team member prepared pre and post questioners for analysis. Pathologist: They are the primary users of this device. A blood sample of a person is taken and is mixed with reagent that is provided with the device. Then the compound is put for testing. The device performs various tests and delivers the result. The user retrieves the result and loads it to the application. Then the result gets displayed in multiple window, the user then alters by navigating across window and comparing with other data and performs analysis on...
Words: 927 - Pages: 4
...Assignment Description: For the unit 2 assignment, I needed to develop a critical path method (CPM) for the design phase of the ABC Video Rental store project. It was suggested that we use table 6-6 from The New Software Engineering by Sue Conger (2008, p. 167) as a guideline for the development of the CPM. Table 6-6 outlines the functional requirements for the program and what different software options, existing or available for development of the application, would be able to meet those requirements. A table that I found more useful for the assignment goals was Table 6-16 which outlined and defined design phase tasks along with an estimated function point value for each task (Conger, 2008, p. 188). After displaying my CPM for the ABC project design phase I will outline the critical path, the various tasks that fit the dependencies from table 6-6, how the various tasks might be distributed between a two-person team of a project manager and software...
Words: 761 - Pages: 4
...1 1. The major goals of a database designer are to properly design a database that provides you with access to up-to-date and accurate information and also to prevent unnecessary duplication of data. One of the basic advantages of the database design is that it helps identify research gaps. All data is stored in one place where it’s easy to find, it’s also designed to be a multimedia system. A correct design is essential to achieving your goals. 2. A null value is that there is no value at all; an absence of a data and it’s not really the same as a zero. Why it’s not the same as a zero because a zero is a zero balance the null value is that its non-data, a data that is not present right now. The three interpretations for a null value are SQL-unknown value, true and false. 3. A switchboard is a form that includes buttons to perform a variety of actions. It is important to a database designer because it ensure users that they can switch between tables, report, and forms by viewing them. What it can do is that access displays a switchboard on which the users’ clicks a button to indicate the table that they want to view. What it can not do is switch between programs. 4. I think that general managers like in a bank should have access to certain tables in the database while other users are “blocked” from that same data. It won’t be right if both have access to the same data because there are personal data the other user should not see or use. For the college example I...
Words: 392 - Pages: 2
...1. List and describe at least nine factors considered in the design specifications for a new system. Give at least one example for each one? The nine factors which are considered in the design specifications for a new system are 1. Input: The whole design of the system depends on the inputs that we provide to develop the system. Ex: Flow, Data Entry. 2. Output: The system developers should consider all the factors like medium, environment, database and timing Ex: medium, timing. 3. Processing: Perform computations, handle program modules, timing of the output. and display the required reports. Ex: Computations, program modules 4. Manual Procedures: The system must consider the nature of the activities, who perform them, how, when and where they are performed. Ex: what activities, when, how 5. Database design: The design of the system must be able to handle the volume of data, execute quickly, record the specifications and organize the files Ex: logical data model, record specifications...
Words: 972 - Pages: 4
...DYNAMITE ELECTRONICS (DE) Objectives of QML Obtaining QML status is a generic way to qualify a manufacturer without extensive end-of-manufacturing qualification testing on each device design. It reduces and replaces the end-of-manufacturing testing with in-line monitoring and testing using SPC. It shifts the focus from device-level to process-level. The foundation for this approach is a TQM approach within the manufacturing environment. It enables a manufacturer to apply for the Malcolm Baldridge National Quality Award within five years of the initial request for the QML status. (Spurgeon, Susan P., Marcinko, Frank, Mengele, Martin J., Lyman, Richard C. "QPL or QML - A Quality Trilogy Approach." 1990 - ASQC Quality Congress Transactions - San Francisco. 1990, pp. 189-193.) QML approach certifies processes rather than individual parts. The key objectives of the QML are: • built-in quality • training and motivation of all employees • Continual improvement the two steps in achieving QML status are: certification and qualification. Certification Requirements. The certification requirements are: • controlled processes • continued improvement • quality-management approach • self-audit with quality enhancement • technical-review board (TRB) acting as corporate conscience • verified reliability of process Qualification Requirements. The qualification requirements are: • Demonstration of the stability and predictability of the manufacturing line (for example, two actual...
Words: 1543 - Pages: 7
...physical infrastructure of the orchards, orchard shacks, and the cold storage building. After doing some detailed investigations of the physical infrastructure of the orchards, orchard shacks, and the cold storage building revealed some ideas that we can implement in the network design. The investigation also showed that wireless technology would be the best solution between the three areas. With that being said the orchard area would be the only problem we would need to find out how big the orchard area is so we can install access points so a good signal can all ways be delivered. Determining the distance will also aid in the network design on what cables like fiber optics or RJ cables, as well as the selection of technologies and devices to meet the design goals. The number of buildings should be determined and what equipment they should contain which types of network devices needed for this landscape. 2. Make a list of business goals for Harriet’s Fruit and Chocolate Company and determine the constraints that will affect these goals. Business goals for Harriet’s Fruit and Chocolate Company are to provide high quality products to customers. Also to provide immediate and real-time access to inventory data to aid in sales, to do this an upgrade logistics would have to take place which in turn everything would have to go digital, we would not be able to continue with the older mom and pop structure we have been used too. Taking those outdated technologies out and bringing in new...
Words: 582 - Pages: 3
...four key steps to the SDLC: (1) planning and selection, (2) analysis, (3) design, and (4) implementation and operation. The first phase in the SDLC is when the organization’s total information system needs are analyzed and arranged. The result of this phase is a potential information systems project is identified. The systems analyst prioritizes and translates the needs of Hoosier Burger and translates the needs into a written plan. The fact of the matter is that Hoosier Burger is processing business by a method of paper-based system, suggesting a valid argument for continuing with the SDLC approach. Systems analysis, the second phase, is when the analyst will thoroughly study the organization’s current procedures to perform the tasks. The analyst must work with users to determine what the users want from the proposed system. For Hoosier Burger, the tasks are inventory control, customer ordering, and management reporting. The systems analysis phase of SDLC is when an alternative replacement system is proposed. Phase three is systems design. This is when the analyst converts the description of the recommended alternative solution into a logical and then physical system specification. According to Valacich (2009), phase three is when “…you must design all aspects of the system from input and output screens to reports, databases, and computer processes…” (Valacich 18). The final product of the design phase is the physical system...
Words: 817 - Pages: 4