Bill Brown:Thoughts and Reference Material Online
open-menucloseme
Home
About
Privacy Statement
Contact
🌐
English Português
rss linkedin
  • Demystifying SQL Retrieval Queries A Step-by-Step Breakdown

    calendar Feb 15, 2024 / Apr 28, 2025 · 4 min read · database-programming sql-tutorial data-management relational-databases  ·
    Share on: twitter facebook linkedin copy

    How Is SQL Query Retrieved, and Conceptually, What Is The Order oF Executing Each of The Six Clauses? SQL or the Structured Query Language described by Bowman, Emerson, & Darnovsky (1997) was proposed in 1970 by Dr. E. F. Codd at IBM and developed the SQL language over the next decade at research facilities and …


    Read More
  • Unveiling Attribute & Relationship Inheritance in EER Diagrams

    calendar Feb 13, 2024 / Apr 28, 2025 · 3 min read · database-programming sql-tutorial data-management relational-databases  ·
    Share on: twitter facebook linkedin copy

    The Mechanism of Attribute/Relationship Inheritance and Why it Useful The enhanced entity-relationship (EER) diagram includes the principles of the entity-relationship diagram with the addition of some other concepts as described by Tupper (2011). The additional concepts include subclasses and superclasses, …


    Read More
  • Mapping EER Model Constructs to Relations in Your Database

    calendar Feb 10, 2024 / Apr 28, 2025 · 3 min read · database-modeling data-management relational-theory database-programming relational-databases  ·
    Share on: twitter facebook linkedin copy

    The Options for Mapping EER Model Constructs to Relations There are many ways of mapping the constructs from the EER model into the relational model. There are mapping of specializations or generalizations, shared subclasses, or multiple inheritance and categories. Several options are available for mapping several …


    Read More
  • Exploring Cursors in Embedded SQL A Balancing Act of Power and Performance

    calendar Feb 8, 2024 / Apr 28, 2025 · 3 min read · database-programming data-management sql-tutorial cursors  ·
    Share on: twitter facebook linkedin copy

    The cursor and usage in embedded SQL The SQL language, by default, uses set-at-a-time processing. While this is used in most SQL queries, sometimes there is a need to loop through the set and execute a stored procedure or many different SQL statements for each row fetched. SELECT statements that return more than one …


    Read More

Disclaimer

The opinions expressed on this site are my own personal opinions and do not represent my employer’s view in any way.

Recent Posts

  • Cryptology Methods in Organizations, CAC vs. User/Password
  • Access Control Methods, A Comprehensive Guide
  • Building Effective Security Awareness in Your Organization
  • Understanding Cryptography, Symmetric, Asymmetric, and Hash Functions
  • A Recommended Course of Action for Information Security & Risk Management
  • Why is an Information Security Program Important for Your Company?
  • LTE Cat M1 The Future of Cellular Networks for IoT
  • A look at Internet Routing, Including Algorithms, Protocols, and Security

Categories

DATABASE SYSTEMS 13 SOFTWARE 12 PROJECT MANAGEMENT 9 ORACLE RAC 8 COMPUTER NETWORKS 7 INFORMATION SECURITY MANAGEMENT 6 COLORADO 2 JUNK MAIL 2 LINUX RED HAT AS 2 NEW ZEALAND 2 RED HAT 2 BOULDER 1 COLDFUSION 1 COLORADO/BOULDER 1
All Categories
BOULDER1 COLDFUSION1 COLORADO2 COLORADO/BOULDER1 COMPUTER NETWORKS7 DATA ANALYTICS1 DATABASE SYSTEMS13 DUNNO1 INFORMATION SECURITY MANAGEMENT6 IOT1 JUNK MAIL2 LACROSSE1 LINUX RED HAT AS2 NEW ZEALAND2 NEW ZEALAND/CHRISTCHURCH1 ORACLE RAC8 PROJECT MANAGEMENT9 RED HAT2 RESEARCH1 SEARCH ENGINE1 SOCIAL MEDIA1 SOFTWARE12 TECHNOLOGY1 VMWARE1
[A~Z][0~9]

Series

BILL BROWN 54

Tags

PROJECT MANAGEMENT 9 ORACLE 7 DATA-MANAGEMENT 6 SECURITY 6 AGILE 5 RAC 5 DATABASE-PROGRAMMING 4 COMMUNICATION 3 CONNECTIVITY 3 DATABASE 3 IOT 3 RED HAT 3 RELATIONAL-DATABASES 3 RELATIONAL-THEORY 3
All Tags
ACCESS CONTROL1 ADMINISTRATION1 AGILE5 ALGORITHMS1 ASM2 AUTHENTICATION2 AUTHORIZATION1 AWARENESS1 BOULDER1 BOULDER COLORADO1 BURN-DOWN-CHART1 BURN-UP-CHART1 CELLULAR TECHNOLOGY1 CFLOOP1 CHRISTCHURCH1 CHRISTCHURH NEW ZEALAND1 CIA TRIAD1 CLUSTER1 COLD FUSION1 COLDFUSION1 COLORADO2 COMMUNICATION3 COMPLIANCE1 CONNECTIVITY3 CONTROLS1 CURRENTROW1 CURSORS1 CYBERSECURITY2 DATA ANALYTICS1 DATA COMMUNICATION2 DATA PROTECTION1 DATA SECURITY2 DATA-MANAGEMENT6 DATA-MODELING2 DATABASE3 DATABASE MANAGEMENT1 DATABASE-MODELING2 DATABASE-PROGRAMMING4 DATABASES2 DESIGN2 DISABLE1 DISASTER PREPAREDNESS1 DOD1 DOS ATTACK1 EARNED VALUE MANAGEMENT1 ECONOMY1 EMPLOYEE TRAINING1 EMPTY1 ENCRYPTION1 ESX1 EVM1 FEDERAL AGENCIES1 FEED1 FILE-FORMATS1 FUTURE1 GOOGLE1 INFORMATION SECURITY2 INFRASTRUCTURE2 INNOVATION1 INSTALLATION1 INTERNET1 INTERNET INFRASTRUCTURE2 INTERNET TECHNOLOGY1 IOT3 IP ADDRESSING1 IPTV1 IT SECURITY1 JUNK MAIL2 LACROSSE1 LACROSSETV.COM1 LEFTHAND NETWORKS SAN1 LOW POWER NETWORKS1 M2M COMMUNICATION1 MANAGEMENT1 METHODOLOGY1 MICROSOFT VIRTUAL SERVER1 MILITARY1 MOBILE NETWORKS1 NESTED CFLOOP1 NETDUMP1 NETWORK SECURITY2 NETWORKING2 NETWORKS2 NEW YEAR1 NEW ZEALAND1 NLL1 NORMALIZATION1 OBJECT ORIENTED1 OBJECT-THEORY1 OPT-OUT2 ORACLE7 ORACLE HOME2 ORACLE RAC2 POSTAL SERVICE1 PRIVACY2 PROJECT MANAGEMENT9 RAC5 RE-COMPILE1 RE-INSTALL1 RECYCLE BIN2 RED HAT3 REDHAT2 RELATIONAL-DATABASES3 RELATIONAL-THEORY3 RELINK1 REMOVE ORACLE RAC RE-INSTALL2 RESEARCH2 RISK MANAGEMENT3 RISK MITIGATION1 ROUTING1 RSS1 SEARCH ENGINE1 SECURITY6 SERVER1 SMART HOME1 SMART LIVING1 SOFTWARE-DEVELOPMENT1 SQL1 SQL-TUTORIAL3 STAKEHOLDER ENGAGEMENT1 STOPTHEJUNKMAIL.COM2 SURVEY1 SYSRQ1 TEAM COMMUNICATION1 TECHNOLOGY3 TECHNOLOGY ADOPTION1 TECHNOLOGY-COMPARISON1 TELECOMMUNICATION1 TRAINING1 TRIPLE CONSTRAINT2 TROUBLESHOOTING1 VIRTUAL1 VMWARE1 VSAM1 VULNERABILITY1 WEB DEVELOPMENT1
[A~Z][0~9]

Links

Oracle Scripts
Boulder CO,80304
Harman Research
BillBrown.info

Copyright 2005-  BILLBROWN.INFO. All Rights Reserved

to-top