× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



From: Joe Pluta <joepluta@PlutaBrothers.com>
> > From: rob@dekko.com
> > Sooner or later some clod will update the data from outside the
> > one 5250 program you think is the only method to update the file.
>
> This is the big argument for referential integrity.  I disagree.
>
> People can only access your data if you let them.  You can avoid any chance
> of this if your file access is done via a service program.  Any access to a
> file requires a call to the appropriate service program.  Files are
> completely secured to a user profile whose authority is adopted by said
> program.

I agree. All access to all files of an application should be handled
by a service program. This allows not only referential integrity but
a host of other good things like keeping track of who did what when.




As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.