× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



<snip>
the most important being that I can't ensure that the validation will be
done
</snip>

But couldn't you? With the server based I/O module approach you basically
- secure the file out from all users except for some user profile reserved
for program adoption
- Set up your I/O module program as owned by that user profile
With the client based I/O module you
- secure the file out from all users except for some user profile reserved
for this
- Tightly control that user id and password to be buried in code somewhere
so that only that one ODBC process can update the data.
I am not saying unfettered ODBC updates anymore than I am saying
unfettered "traditional" updates.
Now, if you, or someone you trust, has written the ODBC process does that
necessarily make it any less protective of the data integrity than a
server based program? I'd argue that the difference shouldn't be any less
between a server based and the client based, than a server based program
written in COBOL versus a server based program written in RPG.

Rob Berendt

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.