[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message] Re: RE: Are people really using Identity constraintsspecified
Hi Folks, I remember reading a long time ago a posting by David Megginson. Paraphrasing, David said, "when dealing with XML you are working down at the bare metal". Other technologies work down at the bare metal, such as TCP/IP. Perhaps there are lessons to be learned there? Certain TCP/IP packets are rejected as bad and the other packets are accepted and passed up to other layers, where those layers perform additional constraint checking. If we accept the conjecture that XML is down at the bare metal level, then perhaps the only constraint checking that should be done by an XML Schema is parallel to the kinds of checking that is done on TCP/IP packets. All other constraint checking is passed up to other layers. Can someone characterize the kind of constraint checking that is done on TCP/IP packets? What would be the parallel constraint checking in XML Schemas? /Roger
|
PURCHASE STYLUS STUDIO ONLINE TODAY!Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced! Download The World's Best XML IDE!Accelerate XML development with our award-winning XML IDE - Download a free trial today! Subscribe in XML format
|