Considering Data Access Strategies

  • Louis Davidson
  • Jessica M. Moss

Abstract

At this point in the process of covering the topic of database design, we have designed and implemented the database, devised effective security and indexing strategies, implemented concurrency controls, organized the database(s) into a manageable package and taken care of all of the other bits and pieces that go along with the task of creating a database. The next logical step is to decide on the data-access strategy and how best to implement and distribute data-centric business logic. Of course, in reality, design is not really a linear process, as performance tuning and indexing require a test plan, and data access is going to require that tools and some form of UI has been designed and that tools have been chosen to get an idea of how the data is going to be accessed. In this chapter I will take a rather brief look at some data access concerns and provide pros and cons of different methods… in other words opinions, technically-based opinions nevertheless.

Keywords

Straw Encapsulation Editing Havoc 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Louis Davidson with Jessica M. Moss 2012

Authors and Affiliations

  • Louis Davidson
  • Jessica M. Moss

There are no affiliations available

Personalised recommendations