home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!dtix!darwin.sura.net!zaphod.mps.ohio-state.edu!sdd.hp.com!cs.utexas.edu!hellgate.utah.edu!csn!teal!ericj
- From: ericj@teal.csn.org (Eric Jacobsen)
- Newsgroups: comp.databases
- Subject: Re: Advanced Revelation information request
- Message-ID: <ericj.724953376@teal>
- Date: 21 Dec 92 15:56:16 GMT
- References: <92Dec12.152128.17650@acs.ucalgary.ca> <1globmINNn4t@crcnis1.unl.edu> <1992Dec17.080403.533@doc.bmd.trw.com>
- Sender: news@csn.org (news)
- Organization: Colorado SuperNet, Inc.
- Lines: 53
- Nntp-Posting-Host: teal.csn.org
-
-
- Thought I'd add some more confusion on AREV validation/integrity options:
-
- >In article <1globmINNn4t@crcnis1.unl.edu>, price@helios.unl.edu (Chad Price) writes:
- >> clinton@acs.ucalgary.ca writes:
-
- >>> Does it support integrity rules in the dictionary?
- >> Not directly, but you can create "symbolic" fields which are in effect programs
- >> to ensure data integrity, and there are hooks into the data entry screens to
- >> allow inclusion of these symbolic fields for data validation. In fact, if you
- >> write the validation code before you create the screen, it is automatically
- >> included.
-
- >Hmmmm.... actually, I would say ARev _does_ support integrity rules in the
- >dictionary... ARev data dictionaries contain 'Edit' constraints which can be
- >any of a wealth of 'canned' constraints [dates, numeric fields, pattern
- >matching, etc..] and can also contain custom constraints through "symbolics"...
- >once you define these edits, they are bound to the data element in any future
- >reference to that element - but this is limited to Paint... so a little caution
- >is prudent - you CAN bypass the edits...
-
- There are actually several levels of integrity checking, which can
- be combined:
- - field-level validation on screen input
- - screen-level validation on screen input
- - record read/write validation on *any* file operation
-
- The first two can be any program you would like to write, and
- frequently are very simple. (Though for some things I do are
- quite complex.)
-
- The last one is done through layered filing systems. You can
- put your own subroutine in a stack of subroutines that gets called
- to perform record reads/writes, and all other file accesses.
- AREV calls this a "modified filing system". In fact, this is
- how indexing works -- AREV creates an MFS to perform index updates.
- Through this methodology, you can insert whatever sort of validation,
- encryption, or audit trails that you like. It's perhaps not something
- for everyone, but if you need it, you won't find it in any other
- products.
-
- Also, the "canned constraints" referred to above can also be
- customized, through user-defined-conversion routines. Throughout
- AREV, there is the concept of 'conversion', which separates
- the stored internal data format from the users' view of the
- data. For instance, dates are stored as an integer, but displayed
- as a date (i.e. 12/21/92 or Dec 12, 1992). You can write your
- own conversion routines, which can also perform validation.
-
-
- Eric Jacobsen
- ericj@csn.org
- [Colorado Revelation User's Group]
-