We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Business Internet Strategies

essay
The whole doc is available only for registered users

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

Business Internet strategies results to more stability in business and market growth influencing the whole process of economic growth.  Information Technology should be considered as a leap or a bridge to the future growth of any business with great, innovations and ideas which are determining factors to global economic changes.  Understanding what roles a relational database in transaction processing plays shed more light on how it is applicable; linking across to providing access to tools which provide integrity by recording and revealing forecast of expectations.  This means they are the central mechanism or literally the brain in our systems.  By delivery of maximum allowable and applicable speed to the value, in order to allow processes that they monitor to deliver.

            However, there are limitations that due to implementations in many interfaces users may be unable to understand exactly what role the system plays unless they are directly involved at the same implementation or relational databases are complex and usually hard to maintain. I would advice that systems to be implemented be unique, accessible, stable and durable so as for any maintenances and updates to reduce the work loads due to compatibility.  In other terms they reduce the resources for processes in transaction since they are managed in a pool hence easily accessible.  Importantly they emphasize function, ease of data access by users, and improve economics of applications development at the expense of computing resources1 Database Role In Information Systems Donald J. Haderie IBM Corporation.  In transaction processes they provide the framework formally specifying the kind of transaction to be considered and changes reflected if successful in the main database.  This is applicable due to growth in demand of real-time services and information.  It is important to note that the processes are monitored during execution; basically this is a medium of information exchange of meeting users’ application needs and requirements.

  In the implementation it is however a little bit different.  The ACID properties latomicity, consistency, isolation, and durability co relate in the concept of consistency which includes physical and logical layers.  Physical consistency relates to the database, internal structures with the logical consistency referring to the validity and consistency of the data within and from applications context managed through the application as well as the data manager.  It is not a simple task in implementation because of updating indices used in speeding searchers in which sequences are subject to fail due to insufficient disk space and lack of enough memory2 Acid Tool Box.Com

Acid properties are not all realized meaning to apply updates to the shadow copy of databases making sure that changes are written to a log before being written to the database ensuring stability if transactions fail or if there is system’s failure or crash.  Then updates are applied to a copy of the database and a new copy activated to commit a transaction, in function the copy refers to unchanged parts of the old version of the database than the entire duplicate.

            Summing it up, these stage databases are relying upon locking to the ACID capabilities.  Meaning locks are required for a transaction in a system even when the information is available (read operations).  Arguably this results to overheads and negatively impacting on concurrency.  In conclusion databases are to maintain separated copies of data that is modified allowing users access and reading data without acquiring locks an alternative to the normal database operations called multiversion concurrency control.  This is flexible in all systems allowing support, increased speed and supporting transactions properties required in all applications or system processes3 Non Blocking distributed system Journal of Systems and software.

            With issues of downtime which have long term impact viability on projects availability in business continuity, planning for internet based business systems there are important considerations.  I would ask for instance; what would one need to be able to work, what are office tasks?  One should consider data protection, transaction availability, and access to systems, local disaster, management, and security with consideration of future IT problems as they arise4 Data base and transaction Processing Phylip M. Levis, Arthur Bernstein, Michael Kifer.  There are also related considerations as loss of critical records loss of computing infrastructure, applications, loss of critical records, loss of computing infrastructure applications, loss of employees and loss of critical service providers and emergency capabilities and requirements in the implementations of the business programs.  In the design itself the business system have a well defined continuity in operations and monitoring the plan envisaging a wide variety of plausible scenarios establish a well structured formal procedures to manage crisis by the system operators, apply testing to ensure effectiveness continuously updating all appropriate sectors.

            All these factors help avoid over dependency on third party providers and check on staff.  They help one identify the critical core functions eliminate disasters providing secondary transaction site5Transaction Processing Jim Gray, Andreas Reuter.  They also assist formulate crisis management.  Today business continuity is more than disaster recovery.

            Main basics of backup and disaster recovery include use of what I call available resources at hand.  Firstly, before looking further one can use simple tape backup.  There are situations for disk to disk to tape back which are faster than the traditional tape versions.  Data is required to be sorted in two physical separate locations which includes rightly off site rotation of tapes to a secondary location.  This method is taskful, tactful and there is delay in file restoration, disk to disk method is advantageous in that data is readily accessible since it is stored on the disk locally and is protected offsite on tapes.  Data can be corrupted on tapes.  Other ways include of vaulting into data hosting or warehousing6Database Transaction Models For Advanced Applications Armed K Elmargarmid 1992 Morgan Kaufmann.  Secondly, there should be clustering of redundant systems so as in the event of failure one system takes over cost effectively is moving all data into a central data centre or collocation alternatively use cheaper of free providers like yahoo and Google.  One should consider the availability of transactions or applications and address security issues as in the case of remote access.  There are also a post disaster consideration which includes the ability to communicate with staff clients and relevant parties.

            One should have at hand manual recovery capabilities for conflict checking critical date docking client records checking and importantly diverse locations for recovery and continuity.  It is always said that prevention is better than cure just as common sense dictates in any office or operation one should prevent rather than plan and wait for a critical disaster in order to measure his or her credibility conclusively, the best practices in the backup data recovery and business continuity systems needs high levels on integrity and strategies that will determine business viability and growth by enabling these transactions accessibility and speed applications with efficient systems.

            Scalability in enterprise systems traditional is made through contributive factors.  Traditionally in this case is provided by information and technology with the understanding of the scale and possible complexities.  In order to enable a scalable enterprise system there are needs for good management.  It is a practice of good quality management services and routine updates of the laid down structures for the internet business systems growth.  For instance in transaction processes of applications frequent updates and maintenance of the laid down or implemented infrastructure of the scalable enterprise systems.  One has to acquire enough resources and food knowledge and methods of skillfully managing enterprise resources, data and services.  Typically configuration of systems, system monitoring, management, optimization, protection, and security are the priorities7 Designing Systems For Internet Commerce. G. Winfield, Treese, Lawrence C Steward.

            Scalability and extendibility are business controls importantly for the design for tiers feeding data to multiples of systems in architecture development scalability means the capacity that the system can be able to handle with reference to function ability, performance, efficiency, and multiple numbers of physical systems with same compatibility platform.  An automatic computing self-management probabilistic modeling should be considered.  Extendibility are the capabilities of the application developed to be expanded to in functioning with future requirements, that is features or an architecture that determisticaly can be modified and enable change in the system depending on the needs by repeating the whole process as writing the whole project instead of updates.  Summarily we need to take into account non functional requirements of the system.

            Reliability is the scale of technical competence for performance, thus a system must be able to process any requested transactions that are in its functional operations architecture making services available.  Basically they are maintained through utilization of services with fundamental elements that is the service layers, roles and the functionality.  In an internet business system specifications are developed and coded to permit composite services that performs the required functions.  By coordination which is controlling the execution of component service output.  Secondly, the monitoring of information produced by the composite services and publisher’s level then assurance of the integrity of the composite services.  The quality of service composition which is the main attribute to readability and reliability by checking the overall composite cost, security, authentication, privacy integrity and scalability.  The solution should be available for maintaining operations or handling transactions conclusively by planning designing and optimization of services.

            A federated commerce system basically is a system that is operated by different systems of same architecture in unison with compatibility working together for successful internet commerce.  A system made up of servers operated by different organizations and tied into an overall global commerce system by web services and a collection of service agreements.  It includes the cleaning, house responsible for tying the network together clients looking for information, purchases, and requests.  Other cores are home communities operating on their interests, services offered and the degree of security.  In addition it has sellers, payment providers, and logistics providers who handle transportation physically.  Federations are useful topology in internet commerce systems because they ease the search for information.  They also make security or privacy affordable in the sense that all required items are found without physical movements or the buyer88IBM Systems Journal Technology For E- Business Vol. 40 number 1 2001.  In design they help designers have a preview of the applications to handled and when considerations should be noted during the designing of and application and operational architecture.

            An application programming interface basically means a set of procedures, methods, and functions that systems use to access feature of another program.  In another description is a conversation and description of the way one piece of an architecture of a software interacts with another in order to perform a service requests.  In an electronics business system they provide interoperability that can run on a range of platforms in the common market place as the online shop by following common standards.   The interfaces are unified to provide compatibility, security with the components that provide accessibility to requests. In all this programs a common language is used and a special enforcement contract that governs how the transaction will be taking place with interaction of protocols. Both situations require legal terms to be addressed. They all involve exchanges of information which are supposed to be defined to avoid misinterpreting and errors that are not defined.

In addition to this there is externalization of core business functions and processes to all the participating parties and the working together of the internal processes using the agreed set of guidelines that we all base on just like in designing an application. Mainly this structure is the general guide line that all the operations will be based. It’s with the protocol or rules that at user interface they are at ease use of abroad standards and measures. In electronic business systems there is linkage of different interfaces and users just as in applications they have to connect users and to existing applications.

References:

[1] Database Role In Information Systems (Donald J. Haderie IBM Corporation)

2Acid Tool Box.Com an e-journal.

3Non Blocking distributed system (Journal of Systems and software. 2003).

4Data base and transaction Processing (Phylip M. Levis, Arthur Bernstein, Michael Kifer).

5Transaction Processing (Jim Gray, Andreas Reuter 2003).

6Database Transaction Models For Advanced Applications (Armed K Elmargarmid Morgan Kaufmann 1992).

7Designing Systems For Internet Commerce. (G. Winfield, Treese, Lawrence C Steward).

8IBM Systems Journal Technology For E- Business (Vol. 40 number 1 2001).

BIBLIOGRAPHY

Haderie, Donald. Role In Information Systems. IBM Corporation 2001

Acid Tool Box.Com

Non Blocking distributed system Journal of Systems and software, 2003

Data base and transaction Processing. Levis, M, Bernstein, A and Michael Kifer.

Transaction Processing Jim Gray and Andreas Reuter, 2003.

Database Transaction Models For Advanced Applications Armed K Elmargarmid Morgan Kaufmann.1992.

Designing Systems For Internet Commerce.  Winfield, G. Treese, and Lawrence C Steward.

IBM Systems Journal Technology For E- Business Vol. 40 number 1 2001

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59