Thursday, October 31, 2019

Parenteral Drug Association (PDA) Essay Example | Topics and Well Written Essays - 750 words

Parenteral Drug Association (PDA) - Essay Example Its mission is, PDA has contributed and played a huge role in providing knowledge for pharmaceutical and biopharmaceutical industry. It has worked towards increasing the individual’s professional knowledge and abilities. PDA publishes the consensus document called PDA’s technical report on the issues where little or no technical guidance exist , its two major membership publications are; the PDA Journal of Pharmaceutical Science and Technology and the PDA Letter, it also publishes the PDA’s newest membership publication, International Pharmaceutical Quality (IPQ). (PDA Annual report 2007). Apart from this it regularly conducts seminars, conferences and workshops which are designed, developed and executed in the way that they provide ample information regarding professional knowledge and abilities. It holds conferences on topics related to pharmacy, microbiology, quality systems, management etc. In 2007 it published 3 of the technical reports as supplement to PDA journal; PDA has contributed many valuable books to the PDA/Davis health care (DHI) publishing library from where people could get access to them easily. The PDA journal has imposed two important students outreach programs; firstly the student research symposium at the PDA 2007 annual meeting and second being the doctoral program which provides funds for the partial support of four graduate students pursuing doctoral research at various universities. To provide a sound professional knowledge the PDA letter also has articles of many industry experts regarding different issues and topics like; â€Å"Articles of Interest to the Microbiologist: A Review of microbiology-related research published in volume 60 (2006) by Scott Sutton, PhD, Vectech Pharmaceutical Consultants, low energy electron beam applications in aseptic filling operations by Cilag and Ike Harper, Johnson & Johnson†(PDA 2007, 8). PDA has launched a number of student programs to promote learning and research

Tuesday, October 29, 2019

Analyzing the Mirror of Sylvia Essay Example for Free

Analyzing the Mirror of Sylvia Essay Sylvia Plath is a name that is famously known in literature as one of the most distinguished female writers of America and the first to receive the prestigious Pulitzer Prize posthumously. Born in Massachusetts on October 27, 1932, she began to have an interest in writing at a very young age. In her whole lifetime, she was able to produce a lot of published works, including an impressive list of poems and stories. In her academic life, Plath has received a lot of prizes and awards including a scholarship to Smith College in 1950 and a Fulbright Scholarship to Cambridge University in 1955. Plath was gifted with an amazing talent in writing, constantly â€Å"was at the top of her class and should logically have been very happy† (Welz). But this was not her case. In fact, Plath was constantly plagued by sufferings and depression. The awards and literary achievements did not always compensate for her feeling of disappointment in herself that is especially emphasized with even just one failure like her suicidal attempt in August of 1953 after she was not accepted to a writing course in Harvard. And yet, people around her were not aware that such depression was forming inside of her because she always projected a happy, contented facade. In a lot of ways, Plath’s personality is always disturbed. She lacked confidence in herself and had a stressful way of viewing life. After he suicide attempt, she was hospitalized â€Å"at Maclean Hospital and was treated with insulin therapy and shock treatments† (Welz). But she continued pursuing her writing which served more than just her passion but as her solace and escape route. In 1956, she met and married her husband who is also a writer, Ted Hughes. Their marriage had been good in the beginning and they produced two children. But in September of 1962, a few months after Plath learned of her husband’s extramarital affairs, the two separated. This is one of the most significant and painful experience in her life. It was evident â€Å"Sylvia had other needs that clashed with her literary ambitions† (Welz). But she did not project this outwardly in her life. As much as she was a very talented and creative writer that was recognized well in the literary society, she also had a lot of personal needs that are often unfulfilled. At some point, Plath also served as an English teacher at Smith College, â€Å"an obvious favorite subject area† (Welz). But she also gave up because she felt dissatisfied and overwhelmed by her work. This led to an increase rate of withdrawal and loneliness, pushing her to write more but limiting her coping and social interaction skills. Most of this feeling was reflected in her poem Mirror that was first written and published in 1961. Mirror was one of the poems that signified a turning point in her style of writing, around the time when life was beginning to become the hardest chapters of her life. The poem is an honest but sad piece of work of that tackles issues of women in the society and in there own selves. It talks about one’s contemplation of all that is hidden and kept, the dream of being accepted, the need to reflect the truth, and the struggle to find one’s importance and purpose in life. â€Å"In Mirror, however, the glass is both subject and speaker at once† (Freedman). It is a poem wherein the object and the author itself are identified as one and they reflect the same qualities and experiences. Plath began the poem by describing the object as something silver and exact. Then, the poem branched out by using a description or characteristic that both the mirror and the author shared through the line â€Å"I have no preconceptions† (Plath line 1). The author’s personality is one that is not prejudiced compared to the others. Just like the mirror, she is truthful to others but remain dishonest to herself. The poem continues with a trait that both the author and the mirror, â€Å"Whatever you see, I swallow immediately† (Plath 2). The author’s personality is to let others dictate how she would feel. There was constant pressure in her part to always do well, having been a model daughter and student her whole life. â€Å"It is the nature and occupation of the mirror self-effacingly to reflect the other† (Freedman). Both the author and the mirror were only passive objects, because they consume whatever is presented to them and reflect it as it is without offering personal beliefs and opinions. It is important to note that the poem was written during the time that Plath had a miscarriage and her marriage with Hughes was facing complications. As a person, Plath was also maturing and becoming more afraid of her life that she feels was completely failing. The second stanza of the poem begins with the line â€Å"Now I am a lake† which reflects a transformation or an evolution that is happening both to the object and to the author (Plath 10). Despite these changes, the purpose they both served remained consistent and the same. The poem reflects that the woman is â€Å"searching my reaches for what she really is† (Plath 11). This indicates the groping for acceptance and importance that everyone is vying for. These are also part of the unfulfilled needs that Plath had her whole life. With everything she had achieved, she still remained discontented because she was not able to embrace her true self and rather rely on other people’s opinions on her. Plath’s experiences, sufferings, frustrations, and dreams in life are definitely reflected in the poem Mirror. As a writer, she was very talented and deserving of her achievements. But as a person, she had a lot of needs that she wasn’t able to voice out and enjoy in her life. It is probably expected that she will take her life again in 1963, and finally succeed. Her unusual, creative, but sometimes overanalyzed perspective in life resulted to a poem as powerful as the Mirror. And the poem’s lines were able to encapsulate the issue of every women seeking for individual identity, fulfillment, and happiness. Works Cited Freedman, William. â€Å"The Monster in Plath’s Mirror. † Papers on Language and Literature. Vol. 108 (5). Oct. , 1993: 152-169. Gale Database: Contemporary Literary Criticism. 1999. Web. 15 July 2010. Retrieved from http://www. sylviaplath. de/plath/freedman. html. Plath, Sylvia. Mirror. Retrieved from http://vmlinux. org/ilse/lit/plath. htm. Welz, Joan. â€Å"Biography of Sylvia Plath. † American Poems. 2009. Web. 15 July 2010. Retrieved from http://www. americanpoems. com/poets/sylviaplath.

Sunday, October 27, 2019

Transaction Management And Concurrency Control Computer Science Essay

Transaction Management And Concurrency Control Computer Science Essay As more networks and databases are connected together, the importance of a solid database management system becomes apparent. Transaction and Concurrency Control, Recovery and Backup, and Security are major functions that should be examined when choosing the correct system. Databases which contain your companys valuable information must be properly protected, backed up, and secure from data loss and unauthorized access. In response to this requirement, both Oracle and Microsoft have implemented strong features into their database products. This paper compares the offerings of the two databases in terms of features, functionality, and ease of management. Table of Contents Introduction Overview a) SQL Server Overview b) Oracle Overview Transaction Management and Concurrency Control a) Overview of Transaction Management and Concurrency Control b) SQL Server TM and CC c) Oracle TM and CC d) Comparison Backup and Recovery a) Overview of Backup and Recovery b) SQL Server B and R c) Oracle B and R d) Comparison Security a) Overview b) SQL Server Security c) Oracle Security d) Comparison Conclusion Introduction This paper will provide a comparative review of three database management system functions: transaction and concurrency control, recovery and backup, and security, between Microsoft SQL Server and Oracle. The purpose is to enhance understanding of database functionality and, through comparison, provide insight into the commonalities and differences between two different systems. Overview of Database Management Systems Microsoft SQL Server is a relational database server, with its primary languages being T-SQL and ANSI SQL. ANSI SQL is the American National Standards Institute standardized SQL and is used as the base for several different SQL languages, including T-SQL. T-SQL is a proprietary extension that uses keywords for the various operations that can be performed, such as creating and altering database schemas, entering and editing data, and managing and monitoring the server. Any application that works through SQL Server will communicate via T-SQL statements. T-SQL has some differences/extensions to basic SQL, including local variables, control of flow language, changes to delete and update statements, and support functions for date and string processing, and mathematics. Version 1.0 of SQL Server was released in 1989 and originated in Sybase SQL Server. Microsoft later ended the co-licensing agreement with Sybase and went on to develop their own version of SQL Server. The latest version is SQL Server 2008, released on August 6, 2008, and includes many improvements to speed and functionality, which will be discussed in further detail below. Sample SQL Server Architecture Diagram 1 Oracle Database is a relational database management system produced by Oracle Corporation. Users can utilize the proprietary language extension to SQL, PL/SQL, or the object-oriented language Java to store and execute functions and stored procedures. Oracle V2 was first released in November 1979 and did not support transactions, but had basic query and join functionality. The latest version is Oracle Database 11g, released in 2007, and includes many enhancements to functionality, which will be discussed in further detail below. Sample Oracle 11g Architecture Diagram 2 Transaction Management and Concurrency Control Overview A transaction, a single logical unit of work, is an action or series of actions that are performed by a user or application which can access or change the database contents. A transaction results in database transformation from one consistent state to another, and can either result in success or failure. A failed transaction is aborted and the database restores to the previous consistent state. The Database Management System is responsible for making sure all updates related to the transaction are carried out, or that stability is maintained in the case of a failed transaction. Transactions have four basic properties: Atomicity, Consistency, Independence, and Durability (ACID). Atomicity means that it is a single unit of work. Consistency ensures that data is always held firmly together in a coherent state, even after a failed transaction or crash. Independence ensures that the effects of an incomplete transaction are contained and not visible to other transactions. Durability ensure s that successful transactions result in permanent changes to the state of the database. Concurrency control is the process of managing and controlling simultaneous database operations. This is required because actions from different users and operations must not interfere with functionality, or the database could be left in an inconsistent state. Potential problems that concurrency control can solve are lost updates, inconsistent analysis, and uncommitted dependencies. The two main concurrency control techniques are locking and timestamping.  [3]   SQL Server TM and CC SQL Server fulfills the ACID requirements by using transaction management, locking, and logging. An explicit transaction is created in SQL Server by using the BEGIN TRANSACTION and COMMIT TRANSACTION commands. ROLLBACK TRANSACTION rolls back a transaction to the beginning or another save point within the transaction. SAVE TRANSACTION sets a savepoint within the transaction by dividing the transaction into logical units that can be returned to if part of the transaction is conditionally cancelled. Locking ensures transactional integrity and database consistency. In SQL Server, locking is automatically implemented, and provides both optimistic and pessimistic concurrency controls. Optimistic concurrency control assumes that resource conflicts are unlikely but not impossible, and allows transactions to execute without locking resources. Pessimistic concurrency control locks resources for the duration of a transaction. SQL Server can lock the following resources: RIDs, keys, pages, extents, tables, and databases. It utilizes several lock modes, including shared, update, exclusive, intent, and schema locks. Shared locks allow for concurrent read operations that do not change or update data, such as a SELECT statement. Update locks prevent a common form of deadlock that occurs when multiple sessions are reading, locking, and potentially updating resources later. Exclusive locks are used for data modification operations, such as INSERT, UPDATE, or DELETE, and ensure that multiple up dates cant be made on the same resource at the same time. Intent locks are used to establish a lock hierarchy, and include intent shared, intent exclusive, and shared with intent exclusive locks. Schema locks are used when a schema dependent operation of a table is executed, and include schema modification and schema stability locks.  [4]   A deadlock occurs when two transactions have locks on separate objects and each user is waiting for a lock on the other object. SQL Server can set deadlock priority by scanning for sessions that are waiting for a lock request, and the SET DEADLOCK_PRIORITY command to customize deadlocking. The SETLOCK_TIMEOUT command can set the maximum time that a statement waits on a blocked resource, because the timeout period is not enforced by default.  [5]   Oracle TM and CC Oracle Database offers two isolation levels, providing developers with operational modes that preserve consistency and provide high performance. Statement level read consistency automatically provides read consistency to a query so that all the data the query sees comes from a single point in time when the query began. The query never sees any dirty data or changes made during query execution. Transaction level read consistency extends read consistency to all queries in a transaction. Oracle uses rollback segments, containing old values of data that have been changed by uncommitted or recently committed transactions, to provide consistent views and does not expose a query to phantoms. Oracle Real Application Clusters (RACs) use cache-to-cache block transfer to transfer read-consistent images of blocks between instances. It uses high speed, low latency interconnects to answer remote data block requests. Isolation levels provided by Oracle Database are read committed, serializable, and read-only. Users can choose the appropriate isolation levels for transactions depending on the type of application and workload, using these statements: SET TRANSACTION ISOLATION LEVEL READ COMMITTED; SET TRANSACTION ISOLATION LEVEL SERIALIZABLE; and SET TRANSACTION READ ONLY. The ALTER SESSION function can then be used to change isolation level for different transactions. Read committed is the default transaction isolation level. Each query executed by a transaction sees data committed before the query began. Oracle Database does not prevent other transactions from modifying the data read by a query, so that data can be changed by other transactions between two query executions. This can lead to non-repeatable reads and phantoms in cases where the transaction runs the same query twice. This isolation level is good for when few transactions are likely to conflict, and can provide higher potential throughput. Serializable transactions see only changes made at the beginning of the transaction, plus changes in the transaction itself through INSERT, UPDATE, and DELETE statements. These transactions do not experience non-repeatable reads or phantoms. This isolation level is suitable for large databases and short transactions that update few rows, when there is a low chance that two concurrent transactions will modify the same rows, or where long-running transactions are primarily read-only. A serializable transaction can modify a data row only if it can determine that prior changes were committed before the current transaction began. Oracle Database uses control information in the data block to indicate which rows have committed and uncommitted changes. The amount of history that is retained is determined by the INITRANS parameter of CREATE and ALTER TABLE. To avoid having insufficient recent history information, higher values can be set for INITRANS for tables that will have many transaction s updating the same blocks. If a serializable transaction fails with the CANNOT SERIALIZE ACCESS error, the application can either commit the work executed to that point, execute additional statements with ROLLBACK, or undo the entire transaction. Read-only transactions see only changes made at the time the transaction began and dont allow INSERT, UPDATE, or DELETE statements. Oracle Database uses locks to control simultaneous access to data resources. Low-level serialization mechanisms called latches are used to protect shared data structures in the System Global Area. Oracle automatically gets the necessary locks when executing SQL statements, using the lowest applicable level of restrictiveness to provide the highest possible data concurrency and data integrity. The user may also lock data manually. There are two modes of locking: exclusive and share lock modes. Exclusive lock mode prevents the associated resource from being shared, and is obtained to modify data. The first transaction to lock the data is the only one which can modify it until the lock is released. Share lock mode allows the associated resource to be shared, depending on the operations. Users reading data can hold share locks to prevent a writer access. Multiple transactions can have share locks on the same resource. All locks created by statements within a transaction last until the tr ansaction is completed or undone. Because row locks are acquired at the highest degree of restrictiveness, no lock conversion is needed or performed. Oracle automatically converts table lock restrictiveness from lower to higher as appropriate. Lock escalation is when multiple locks are held at one level of granularity, and a database raises the locks to a higher level of granularity. An example is converting many row locks into one table lock. Oracle Database never escalates locks, because this increases the chances of deadlocks. A deadlock occurs when two or more users are waiting on data locked by each other. This can prevent transactions from continuing to work. Oracle automatically detects deadlocks and solves them by rolling back one of the statements. User generated deadlocks can be avoided by locking tables in the same order for transactions accessing the same data. Oracle Database locks fall into three general categories: DML locks (data locks), DDL locks (dictionary locks), and Internal locks and latches. DML locks protect data (i.e. tables, rows). The purpose is to guarantee the integrity of data accessed by multiple users. Row locking is the finest granularity and has the best possible concurrency and throughput. A transaction always acquires an exclusive row lock for each individual row modified by INSERT, UPDATE, DELETE, and SELECT with the FOR UPDATE clause. If a transaction uses a row lock, it also uses a table lock for the corresponding table. Table locking is mainly used for concurrency control with DDL operations. Table locks are used when a table is modified by the INSERT, UPDATE, DELETE, SELECT with FOR UPDATE, and LOCK TABLE DML statements. These statements require table locks to reserve DML access to the table for the transaction and to prevent conflicting DDL operations. Table locks can be used at both table and subpartition level for partitioned tables. A table lock can be held in the following modes, from least to most restrictive: row share (RS), row exclusive (RX), s hare (S), share row exclusive (SRX), and exclusive (X). A row share table lock is the least restrictive, and has the highest degree of concurrency for a table. It indicates the transaction has locked rows in the table and intends to update them. It is specified by the statement LOCK TABLE IN ROW SHARE MODE. A row exclusive table lock is slightly more restrictive, and indicates the transaction holding the lock has made one or more updates to rows in the table or issued a SELECT FOR UPDATE statement. It is specified by LOCK TABLE IN ROW EXCLUSIVE MODE;. A share table lock is made automatically for a table specified by the statement LOCK TABLE IN SHARE MODE;. A share row exclusive lock is more restrictive and is made for a table specified by the statement LOCK TABLE IN SHARE ROW EXCLUSIVE MODE;. Exclusive table locks are the most restrictive and are specified by the statement LOCK TABLE IN EXCLUSIVE MODE;. DDL locks protect the structure of schema objects (i.e. table definitions). Internal locks and latches are automatic and protect internal data structures such as data files. Only individual schema objects that are modified or referenced are locked during DDL operations. The entire data dictionary is never locked. DDL locks have three categories: exclusive DDL locks, share DDL locks, and breakable parse locks. Exclusive and share DDL locks last until DDL statement execution and automatic commit is complete. Most DDL operations require exclusive DDL locks for a resource to prevent interference with other DDL operations that might reference the same object. If another DDL lock is already held, then the operation must wait until the other lock is released to proceed. DDL operations also create DML locks on the modified schema object. Some DDL operations require share DDL locks to allow data concurrency for similar DDL operations. A share DDL lock is created for the following statements: AUDIT, NOAUDIT, COMMENT, CREATE (OR REPLACE) VIEW/ PROCEDURE/ PACKAGE/ PACKAGE BODY/ FUNCTION/ TRIGGER, CREATE SYNONYM, and CREATE TABLE (if CLUSTER is not used). Breakable parse locks are acquired is created for a SQL statement and each schema object it references. A parse lock does not restrict any DDL operation and can be broken to allow conflicting DDL operations. It is created in the parse phase of SQL statement execution and held as long as the shared SQL area for the statement is in the shared pool. Latches and internal locks protect internal database and memory structures. Users cannot access them. Latches are simple, low-level serialization mechanisms to protect shared data structures in the system global area. The use of latches is dependent on the operating system. Internal locks are higher-level, more complex mechanisms and include dictionary cache locks, file and log management locks, and tablespace and rollback segment locks. Dictionary cache locks are very short and are on dictionary caches while the entries are being modified or used. They make sure that parsed statements dont have inconsistent object definitions. They can be shared or exclusive; shared last until the parse is finished and exclusive last until the DDL operation is finished. File and log management locks protect different files. They are held for a long time because they indicate the status of files. Tablespace and rollback segment files protect tablespaces and rollback segments. All instances must agree whether a tablespace is online or offline. Rollback segments are locked to make sure that only one instance can write to a segment.  [6]   Comparison Microsoft SQL Server is enabled to lock smaller amounts of data at a time, which is a big improvement. There is row-level locking, so now SQL Server locks only the rows that are actually being changed. However, SQL Server has no multi-version consistency model, which means that reads and writes can block each other to ensure data integrity. The difference with Oracle is that the database maintains a snapshot of the data, which prevents queries from hanging without performing dirty reads. Backup and Recovery Overview Database backup and recovery mechanisms ensure that organizations have prepared a copy of their data, or have the tools necessary to recover from a failure. A failure is a state where inconsistency prevents transactions from reaching the desired results. Some types of failures are transaction failure, system failure, media failure, and communications failure. Transaction failure may be caused by deadlocks, time-outs, protection violations, or system errors. Transaction failures can be solved with either a partial or total rollback, depending on the extent of the failure. System failures can be recovered with a restart, or rollback to the last consistent state. Restore/roll forward functions help with restoring the database after a media failure. SQL Server B and R SQL Server databases consist of two physical hard drive files, the MDF and LDF files. MDF files contain all of the data being stored. LDF files contain a record of every data change. Logging data changes make undo operations and backups possible. The log file is cleared, or truncated, after a certain amount of time, which is determined by the database recovery model. SQL Server can maintain multiple databases, with different recovery model settings. The recovery model can be either simple, full, or bulk-logged. With simple recovery, log files are not kept permanently, so when this setting is activated, a full backup must be done. Full backups restore all of the data and cannot be set to a specific time. The full recovery setting refers to a database with a transaction log file history. The log files keep track of every data change operation. The database will stop working if the log file runs out of space, so the auto grow function can be enabled. When running in full recovery, differential and transaction log backups become available. Differential backups copy all data changes since the last full backup. Every time a full backup is run, the differential backup is reset. Transaction log backups copy all data changes since the last full or transaction log backup. They are usually very small and fast. The disadvantage is the level of recovery; if any log backup is damaged or unusable, the data is not recoverable past the last good backup.  [7]   Oracle B and R Oracle databases can be backed up using export/import, cold or off-line backups, hot or on-line backups, or RMAN backups. Exports extract logical definitions and data from the database to a file. Cold or off-line backups shut down the database and backup all data, log, and control files. Hot or on-line backups set the tablespaces into backup mode and backup the files. The control files and archived redo log files must also be backed up. RMAN backups use the rman utility to backup the database. More than one of these methods can and should be used and tested to make sure the database is securely backed up. On-line backups can only be done when the system is open and the database is in ARCHIVELOG mode. Off-line backups are performed when the system is off-line; the database doesnt have to be in ARCHIVELOG mode. It is easier to restore from off-line backups because no recovery is required, but on-line backups are not as disruptive and dont require database downtime. Point-in-time recovery is available in ARCHIVELOG mode only.  [8]   Comparison Starting with version 10g, Oracle Database adopted the Automatic Storage Management (ASM) feature, which automates storage management after a certain point. The DBA allocates storage devices to a database instance and it automates the placement and storage of the files. SQL Server storage management must be done manually, using the Share and Store Management Console in SQL Server 2008, or must purchase a separate tool. Oracles Flash Recovery feature automates the management of all backup files. The Flash Recovery area is a unified storage location for all recovery related files in the Oracle database. The DBA can also change the storage configuration without having to take the database offline. SQL Server also provides the ability to manage backup files, using a backup wizard to manage the relevant files, but does not do it automatically. SQL Server 2008 introduced improvements in backup compression. With compression, less disk I/O and storage is required to keep backups online, resu lting in increased speed. Tradeoffs seem to be between SQL Servers speed and Oracles increased functionality. In Oracle, backups are fully self-contained, but in SQL Server the DBA must manually recreate the system database using the install CD. Oracle also uses the Data Recovery Advisor (DRA) tool to automatically diagnose data failures, show repair options, and execute repairs at the users request. Oracles Flashback technology allows for instant recovery of dropped tables and logical data corruptions. SQL Server provides for data recovery by rebuilding the transaction log, running repair to fix any corruptions, and ensure the logical integrity of data is not broken.  [9]   Security Overview Security is an important part of any organizations database management system. According to Dr. Osei-Brysons lecture notes, security breaches are typically categorized as unauthorized data observation, incorrect data modification, or data unavailability. Unauthorized data observation discloses confidential information to users without the proper permissions. Incorrect data modification can be either intentional or unintentional, but can be devastating to database consistency and can result in unreliable data. Unavailable data can be very costly to an organization, depending on how the data is used. Three requirements for a data security plan include secrecy and confidentiality, integrity, and availability. Secrecy and confidentiality protects data from being accessed by unauthorized parties. Database integrity is important to protect the data from incorrect or improper modification. Availability means preventing and minimizing the damage from unavailable data. Database management systems include some form of access control mechanism to make sure each user has access to only the data they require to perform their jobs. Users are granted certain authorizations by a security administrator to determine which actions can be performed on each object. The database administrator is responsible for account creation, assigning security levels, and granting/revoking privileges. SQL Server Security Security is an integral part of SQL Servers package, according to a recent White Paper commissioned by Microsoft.  [10]  Security features for Microsoft SQL Server 2008 include policy-based management to apply policies to database objects. These policies contain a collection of conditions that can be used to enforce business and security rules. Oracle Security Oracle 11g uses supports strong authentication through KPI, Kerberos, and Radius for all connections to the database except connections made as SYSDBA or SYSOPER. Tablespace encryption provides an alternative to transparent data encryption column encryption by enabling the encryption of the entire tablespace. This is best used with large amounts of data. The transparent data encryption master key can be stored in an external hardware security module for stronger security. 11g also provides increased password protection, secure file permissions, optional default audit settings, and controls on the network callouts from the database.  [11]   Comparison In SQL Server, transparent data encryption encrypts and decrypts data in the database engine and doesnt require more application programming. The functionality is included in SQL Server 2008, but requires a $10,000 per processor additional charge with Oracle Database 11g. SQL Server 2008 allows Extensible Key Management and Hardware Security Module vendors to register in SQL Server and provide management that is separated from the database. This separation of keys from the data provides an additional layer of defense. SQL Server 2008 also has auditing support through an Auditing object, which allows administrators to capture and log all database server activity. The National Vulnerability Database, provided by the National Institute of Science and Technology, reported over 250 security vulnerabilities with Oracle products over a four year period, and none with SQL Server. The report did not list the type and severity of the vulnerabilities, or which specific products were affected, but there seems to be a trend toward vulnerability. Microsoft Update is a fairly straightforward and easy to use patching solution for SQL Server. Computerworld called Oracles patch management system involved excruciating pain and two-thirds of Oracle DBAs dont apply security patches. Oracle seems to be behind in patch management at this time. SQL Server can also prevent highly privileged users from accessing sensitive data through use of the auditing object, assigning individual permissions, module signing, Policy-based management, and additional functionality. Oracle uses Database Vault to control privileged access, but costs 20k per processor. Conclusion The comparative review of Transaction Management and Concurrency, Recovery and Backup, and Security functions on Microsoft SQL Server and Oracle 11g database has shown that there are many similarities in the functionality between the two companies, but also key differences in database management philosophy. I learned that SQL Server seems to have the edge on speed and better security, but Oracle is making many advances in high level functionality and is starting to automate many features than in previous years. I was also able to improve my understanding of the DBMS functions by examining their practical application in separate systems.

Friday, October 25, 2019

Anorexia and Bulimia :: Causes of Bulimia Nervosa, Anorexia

Bulimia nervosa is defined as two or more episodes of binge eating (rapid consumption of a large amount of food, up to 5,000 calories) every week for at least three months. The binges are sometimes followed by vomiting or purging and may alternate with compulsive exercise and fasting. The symptoms can develop at any age from early adolescence to 40, but usually become clinically serious in late adolescence.   Ã‚  Ã‚  Ã‚  Ã‚  Bulimia is not as dangerous to health as anorexia, but it has many unpleasant physical effects, including fatigue, weakness, constipation, fluid retention, swollen salivary glands, erosion of dental enamel, sore throat from vomiting, and scars on the hand from inducing vomiting. Overuse of laxatives can cause stomach upset and other digestive troubles. Other dangers are dehydration, loss of potassium, and tearing of the esophagus. These eating disorders also occur in men and older women, but much less frequently. Women with diabetes, who have a high rate of bulimia, often lose weight after an eating binge by reducing their dose of insulin. According to recent research, this practice damages eye tissue and raises the risk of diabetic retinopathy, which can lead to blindness.   Ã‚  Ã‚  Ã‚  Ã‚  Many anorectic women also indulge in occasional eating binges, and half of them make the transition to bulimia. About 40% of the most severely bulimic patients have a history of anorexia. It is not clear whether the combination of anorexia with bingeing and purging is more debilitating, physically or emotionally, than anorexia alone. According to some research, anorectic women who binge and purge are less stable emotionally and more likely to commit suicide. But one recent study suggests that, on the contrary, they are more likely to recover.   Ã‚  Ã‚  Ã‚  Ã‚  The exact cause of the disorder is unknown, but a variety of psychological, social, cultural, familial and biochemical theories are being investigated. Bulimia has been recognized for a much shorter time than anorexia, and there is less research on its origins. One theory is that bulimic women lack all the parental affection and involvement they need and soothe them with food as compensation. The overeating subdues feelings of which they are barely conscious, at the price of later shame and self-hatred. One recent study found that bulimic women differed from depressed and anxious women in several ways. They were more likely to be overweight, to have overweight parents, and to have begun menstruating early. They were also more likely to say that their parents had high expectations for them but limited contact with them.

Thursday, October 24, 2019

Induction of Employees Essay

Starting a new job is stressful for most employees because of the initial feeling of being out of place and under pressure to make a positive impression to fellow co-workers and managers. It is therefore important that all new employees are made to feel welcome and valued and are also made aware of what is expected of them during their employment (Macdonald 2004, p. 104). Induction is regarded as the final stage of recruitment and selection but the first phase in the training and development of new employees. Induction is the process of familiarizing new employees to the company and their jobs with the aim of giving the employees a proper understanding of how things are done. Induction also known as orientation serves the purpose of providing a transition for the employee from college to work life. Since most employees start their work with a desire to succeed, induction programs offer the opportunity for them to achieve this (Compton and Nankervis 2009). Ideally an induction program involves a tour of the building showing the fire exit points, toilets, meeting and break rooms, important offices like the CEO’s office, supplies office and the Human Resources Department. The induction program will be determined by the type of job, cultural practices and structure of the organization. Induction for smaller companies might even involve a conversation with the Human Resources Manager while that for large organizations might involve several weeks of training and supervision (Compton and Nankervis, 2009). During the recruiting process, new recruits always have high expectations about their new jobs and the company. They might also have unrealistic expectations which might not be met leading the recruits to have feelings of dissatisfaction and anxiety. In general, unmet expectations lead to employee dissatisfaction which in turn leads to high employee turnover (Werner and DeSimone 2009). Some companies do not view the orientation of employees into an organization as important. Some take it as a waste of time and they therefore conduct the programs in a haphazard way. Others might not have the programs at all which will result in the employee going straight into the job without any idea on what to do. The induction of employees has benefits such as reduced employee turnover, lower recruitment and selection costs, increase in employee morale. It also reduces the anxiety levels of employees. Overly anxious employees might increase costs in the area of education and development, turnover and absenteeism (Compton and Nankervis 2009). In today’s competitive working environment, orientation programs are not meeting the goals they were designed for. The reason these programs fall short is due to lack of planning, lack of expectations and the feeling of disillusionment by most employees. Attracting qualified workers includes offering higher salaries, better benefits and career advancement opportunities. With such increased costs, retention of employees becomes the main focus of a company instead of production (Squidoo 2010). Mistakes that are made during the induction process include activities such as bombarding new recruits with a lot of information on the first day and expecting them to memorize it, showing boring or outdated orientation videos, giving lengthy lectures about irrelevant information and failing to provide the new worker with a work station that has necessary facilities such as a computer, phone, printer and internet connection. Some employers also fail to give out any work leading the recruits to sit idle for most of the day (Squidoo 2010). The most frequent complaints about employee orientation programs is that they are overwhelming to the new employee thereby not providing the smooth transition that is needed to begin working. It becomes overwhelming especially if there is a test or quiz at the end of the program which requires the new recruits to remember all the information they have just been presented with. This adds on more pressure to the already anxious worker. Most Human Resource Managers involve a lot of paperwork on the first day especially if the information required has a deadline. They might require the employee to fill in forms with regards to their pay, compensation and benefits. There might also be contractual paperwork which the employee has to go through and sign. This process might take a lot of time and there might be some issues which the employee does not understand and there is no one around to clarify (Werner and DeSimone 2006). Other shortfalls of induction programs are the fact that there is a lot of one way communication instead of two way communication. The program coordinator usually fails to involve the recruits in the exercise which explains why it ends up being boring. Encouraging participation will ensure the program is lively and runs smoothly. The programs also fail to evaluate the recruits properly. Most induction coordinators use tests or quizzes as methods of evaluating the employees which are not the best. This puts on more pressure and anxiety to the employee who is already too anxious. Induction programs also lack follow-up in some companies meaning once they are done the employees are all on their own. This is especially the case if the program runs for only one day. Assigning mentors ensures that they have someone to turn to in the event they face a problem while carrying out their jobs (Werner and DeSimone 2006). Swinton (2005) provides examples of induction plans that fail in their intended purpose. Such an example is the pitiful induction plan where there is basically no induction program that has been prepared. According to her the new recruit will be lucky to have his own workspace or have co-workers introduce themselves to him or her. Since there is no effort for orientation, the recruit finds it hard to put in effort in their work especially when they do not know what to do and how to do it. Another example of a failed plan is the mediocre induction plan where the coordinator uses past orientation material that is outdated and irrelevant to conduct the program. This plan also uses very detailed information which proves to be overwhelming, cumbersome and boring to the new recruits. Some also use financial reports, health records and company reports as a way of informing the employees about the new company (Swinton 2005). Having other workers conduct the orientation program has its benefits as well as disadvantages. While the worker gets the actual feel of how the job is done, they are more prone to bad influence from the workers inducting them. Bad influence comes in the form of misuse of office supplies, taking extended breaks, coming late to work and leaving early before the recommended time. Those employees who do not undergo proper induction learn by observing what their fellow co-workers do. This might be to their detriment as they are more likely to pick up bad habits from co-workers who come to work late and spent a small amount of time in a day doing actual work. Induction programs that are not conducted properly end up being a waste of time and resources for both the employer and the employee. The quality of the staff induction program says a lot about a company and how important it views its employees. Employees will work harder for a company that shows it values them by providing quality induction programs. Companies should put in the same effort they do to induction programs when they create programs for attracting and retaining customers.

Tuesday, October 22, 2019

Mixed Economic System Essay

A mixed economy is an economic system in which both the private sector and state direct the economy, reflecting characteristics of both market economies and planned economies. Most mixed economies can be described as market economies with strong regulatory oversight and governmental provision of public goods. Some mixed economies also feature a variety of state-run enterprises. A mixed economic system (also known as a Dual Economy) is just like it sounds (a combination of economic systems), but it primarily refers to a mixture of a market and command economy (for obvious reasons, a traditional economy does not typically mix well). As you can imagine, many variations exist, with some mixed economies being primarily free markets and others being strongly controlled by the government. In general the mixed economy is characterized by the private ownership of the means of production, the dominance of markets for economic coordination, with profit-seeking enterprise and the accumulation of capital remaining the fundamental driving force behind economic activity. But unlike a free-market economy, the government would wield indirect macroeconomic influence over the economy through fiscal and monetary policies designed to counteract economic downturns and capitalism’s tendency toward financial crises and unemployment, along with playing a role in interventions that promote social welfare. Subsequently, some mixed economies have expanded in scope to include a role for indicative economic planning and/or large public enterprise sectors. Advantages of A Mixed Economy In the most common types of mixed economies, the market is more or less free of government ownership except for a few key areas. These areas are usually not the resources that a command economy controls. Instead, as in America, they are the government programs such as education, transportation, USPS, etc. While all of these industries also exist in the private sector in America, this is not always the case for a mixed economy. Disadvantages of A Mixed Economy While a mixed economy can lead to incredible results (America being the obvious example), it can also suffer from similar downfalls found in other  economies. For example, the last hundred years in America has seen a rise in government power. Not just in imposing laws and regulations, but in actually gaining control, becoming more difficult to access while simultaneously becoming less flexible. This is a common tendency of mixed economies. Introduction to Economic Systems There are four primary types of economic systems in the world: traditional, command, market and mixed. Each economy has its strengths and weaknesses, its sub-economies and tendencies, and, of course, a troubled history. In this project examine each system in turn and give ample attention to the attributes listed above. It’s important to understand how different parts of the world function economically, as the economy is one of the strongest forces when it comes to balancing political power, instigating war and delivering a high (or low) quality of life to the people it serves. An economic system is a system of production and exchange of goods and services as well as allocation of resources in a society. It includes the combination of the various institutions, agencies, entities (or even sectors as described by some authors) and consumers that comprise the economic structure of a given community. A related concept is the mode of production. The study of economic systems includes how these various agencies and institutions are linked to one another, how information flows between them, and the social relations within the system. Among existing economic systems, distinctive methods of analysis have developed, such as socialist economics and Islamic economic jurisprudence. Today the dominant form of economic organization at the global level is based on market-oriented mixed economies.