Re: Upgrade from 5.6 => 5.7

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 9/15/11, Always Learning <centos@xxxxxxxxxxx> wrote:

>> Next you'll be saying you don't use triggers and constraints either.
>
> Not consciously. Never heard of them.

You should take a look at constraints, they are good for ensuring
certain types of data integrity. For example, it would make the
database to stop situations like somebody trying to insert a record
referring customer #9865 but in fact #9865 doesn't exist, whether it
was an unintentional user error or a bug in the application.


> Hopefully that is always possible - retrieving EXACTLY what was stored
> in the database. Why would one want the database to manipulate (change)
> data ? Is that a solution for lazy programming ?

No, in many situation, it's a more secure method. Databases can have
privileges set. You could have triggers and stored procedures that
update certain records that cannot otherwise be altered by the
application which can be written by a third party. For example, a
stored procedure would require both a debit and credit account for
transferring funds and/or checks that the actual amount is present
before doing it. Without this, a bugged application or rogue user/dev
who run the app with privleged access would be able to transfer funds
that don't exist.


> Simplicity and good design makes applications fast.

For some apps, fast is king. For some, data security and integrity is
ultimate. Would you want your banking transactions to run faster by
stripping out security and validation checks, at the risk that some
dude can transfer all your money into somebody else account? If so,
please let me know your bank account details and access credentials, I
have a program to speed up your banking transactions... ;)

> The integrity of the data can be divided into two aspects: ensuring the
> data remains constant (unaltered) while stored, which is the
> responsibility of the operation system and the database software, and
> the data's integrity from an application perspective. Junk-in always
> causes Junk-out even when using 'non-dumb' databases :-)

And if the database can further ensure that the application cannot put
junk in, whether due to a bug, user error or deliberate fraud, why
not? Especially when it's likely to be faster because it's native
code.
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux