Lists Home |
Date Index |
- To: <firstname.lastname@example.org>, <email@example.com>
- Subject: RE: [xml-dev] Are people really using Identity constraints specified in XML schema?
- From: "Hunsberger, Peter" <Peter.Hunsberger@STJUDE.ORG>
- Date: Wed, 25 Aug 2004 09:26:28 -0500
- Thread-index: AcSKdTewJyVLQ7cPR+eTKj0lUJtH9QAOc9lg
- Thread-topic: [xml-dev] Are people really using Identity constraints specified in XML schema?
firstname.lastname@example.org <email@example.com> writes:
> Roger Costello wrote:
> > How would you characterize the distinction between "business rules"
> > and "constraints on data"?
> Misleading. Or, rather, not a distinction that necessarily
> should play a part in systems architecture, except as one
> input to the design. In the same way, the distinction between
> different kinds of user interfaces such as whether to use
> field-level validation of forms, is useful as a design
> consideration but not as the basic for an information architecture.
Yes, exactly, thank you for your clarity. Trying to come up with iron
clad rules on this doesn't seem productive.
<snip>More very good discussion generalizing this same point across many
aspects of this thread.</snip>