|
From: Joe Pluta <joepluta@PlutaBrothers.com> > > From: rob@dekko.com > > Sooner or later some clod will update the data from outside the > > one 5250 program you think is the only method to update the file. > > This is the big argument for referential integrity. I disagree. > > People can only access your data if you let them. You can avoid any chance > of this if your file access is done via a service program. Any access to a > file requires a call to the appropriate service program. Files are > completely secured to a user profile whose authority is adopted by said > program. I agree. All access to all files of an application should be handled by a service program. This allows not only referential integrity but a host of other good things like keeping track of who did what when.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.