Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Slimmed Down MySQL Offshoot Drizzle is Built For the Web

rasilon Re:Oh man. (370 comments)

He seems to have a tendency to represent the worst possible uses of various things as typical usage, and ignore a number of useful things.

For example, he claims that the security uses of stored procedures have been replaced by role based access control. That's incorrect. If you want to audit changes to a table using RBAC then the user not only needs access to the audit table but must always update it themselves. A user could easily cover up changes by simply omitting the audit row, or adding false data. The use of triggers and stored procedures can enforce the audit, and protect it from malicious update.

His claim that triggers are a bad idea because a novice DBA once disabled them on a production database, not realising that they existed, is just silly. The fix is to ensure that people get a clue before they get superuser access! Triggers are a standard part of every big modern database, and a standard part of any training program.

I could go on, but I don't really fancy debunking every silly thing people write about databases...

more than 6 years ago


rasilon hasn't submitted any stories.


rasilon has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?