OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

 


 

   RE: [xml-dev] Are people really using Identity constraints specifie

[ Lists Home | Date Index | Thread Index ]
  • To: <rjelliffe@allette.com.au>, <xml-dev@lists.xml.org>
  • Subject: RE: [xml-dev] Are people really using Identity constraints specified in XML schema?
  • From: "Hunsberger, Peter" <Peter.Hunsberger@STJUDE.ORG>
  • Date: Wed, 25 Aug 2004 09:26:28 -0500
  • Thread-index: AcSKdTewJyVLQ7cPR+eTKj0lUJtH9QAOc9lg
  • Thread-topic: [xml-dev] Are people really using Identity constraints specified in XML schema?

rjelliffe@allette.com.au <rjelliffe@allette.com.au> writes:
> 
> Roger Costello wrote:
> 
> > How would you characterize the distinction between "business rules" 
> > and "constraints on data"?
> 
> Misleading. Or, rather, not a distinction that necessarily 
> should play a part in systems architecture, except as one 
> input to the design. In the same way, the distinction between 
> different kinds of user interfaces such as whether to use 
> field-level validation of forms, is useful as a design 
> consideration but not as the basic for an information architecture.
 
Yes, exactly, thank you for your clarity. Trying to come up with iron
clad rules on this doesn't seem productive.

<snip>More very good discussion generalizing this same point across many
aspects of this thread.</snip>





 

News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS