preview

Essay on Databases

Good Essays

Databases in My Organization

Abstract
Databases have been in use since the early days of computing programs. An Information Technology services company, such as Getronics, not only utilizes databases for information and record management, it earns revenue by providing database management services. Getronics uses Microsoft SQL Server 2000 as its database software. The clients that contract Getronics for Information Technology services rely and depend on the accuracy and currency of the database information that is stored. Databases will continue to exist and expand as more companies become more of aware of the importance of record and data management.
Databases have been in use …show more content…

An incident management system tracks end user requests, problems, and changes that are recorded by a service desk, or help desk team. The application relies on over 300 tables that contain individual pieces of information the build an end user’s request. Each table is linked by a common, unique identifier, commonly known as primary key. This unique identifier exists in all tables and links the records together. However, even though the backend application is complex, to a help desk technician, the information is presented in the incident management system in an organized, presentable manner. The help desk technician does not have to search the 300 or more tables to locate a specific piece of information.
Another database that is used by Getronics is the human resources database that is linked to the SAP application. This database contains all of Getronics’ employee information including such private details like social security number and mother’s maiden name. This database is secured database that can not be accessed by any employee. In fact, not even the database administrator can see the text that is stored in the records for the employees. The data is encrypted. Since Human Resource databases typically contain financial and personnel information, it is important that the data is secured. The encryption provides security for the private and confidential

Get Access