The Elephant in the Fridge by John Giles
Author:John Giles [John Giles]
Language: eng
Format: epub
Publisher: Technics Publications
Published: 2019-05-01T16:00:00+00:00
Alex and Chris, are salaried employees, managed in the Payroll system. Brook and Dan are contractors, managed in the Contract Management system. All four employees are also recorded in the central Human Resource (HR) system. In addition, Alex, Brook, and Dan have been issued with cards to get access to the head office building (Chris doesn’t need one for his/her line of work out in the field because he/she rarely if ever visits the head office).
In the diagram, we also have arrows. These denote one system’s knowledge about the business keys of another system. The first row, for Alex, indicates that the Building Access Control system obviously knows about its own keys, but also knows the Payroll system’s Employee Number for Alex.
In this hypothetical, the HR system generates its own employee numbers, which are the “business keys”, used and known by each employee as their identifier. They enter it on timesheets, and quote it if they ever have to record other activities. Yes, it is internally generated by the HR system, and some may argue it’s a surrogate, but it is externally visible, and it is used by the business as the identifier for employees.
The Payroll system also has employee numbers, but it doesn’t generate its own. It simply reuses the employee number as generated by the HR system.
The Contract Management system is a little different. When someone is added as a new contractor, the Contract Management System generates its own key which is issued to the contractor – it’s another business key! But what’s more, the Contract Management System also records the HR system’s employee number. Please note that while both systems use integer numbers for their keys, they are generated independently. As it turns out, the number “2” appears in both systems, but Employee Number 2 is for Brook (whose Contractor Number is 1), and Contractor Number 2 is for Dan (whose Employee Number is 4). Confused?
Finally, we’ve got the Building Access Control systems’ Card Holder Numbers. Again, these can be used as “business keys”, as they appear on the card itself, and can be recorded by people at the front office desk. Thankfully, these business keys are alphabetic, and cannot be confused with any of the other business keys for employees. Please note than when a card is issued (and its Card Holder ID generated), the system also records
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Access | Data Mining |
Data Modeling & Design | Data Processing |
Data Warehousing | MySQL |
Oracle | Other Databases |
Relational Databases | SQL |
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(7880)
Learning SQL by Alan Beaulieu(5449)
Weapons of Math Destruction by Cathy O'Neil(5072)
Big Data Analysis with Python by Ivan Marin(3190)
Blockchain Basics by Daniel Drescher(2909)
Building Statistical Models in Python by Huy Hoang Nguyen & Paul N Adams & Stuart J Miller(2826)
Azure Data and AI Architect Handbook by Olivier Mertens & Breght Van Baelen(2796)
Serverless Machine Learning with Amazon Redshift ML by Debu Panda & Phil Bates & Bhanu Pittampally & Sumeet Joshi(2721)
Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2571)
Pandas Cookbook by Theodore Petrou(2519)
Mastering Python for Finance by Unknown(2505)
Data Wrangling on AWS by Navnit Shukla | Sankar M | Sam Palani(2503)
Driving Data Quality with Data Contracts by Andrew Jones(2385)
Data Engineering with dbt by Roberto Zagni(2261)
How The Mind Works by Steven Pinker(2241)
Machine Learning Model Serving Patterns and Best Practices by Md Johirul Islam(2176)
Building Machine Learning Systems with Python by Richert Willi Coelho Luis Pedro(2066)
Network Science with Python and NetworkX Quick Start Guide by Edward L. Platt(2047)
Learn T-SQL Querying by Pam Lahoud & Pedro Lopes(1978)