SlideShare is now on Android. 15 million presentations at your fingertips.  Get the app

×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Data Integrity in Java Applications (JFall 2013)

by CTO at AMIS on Nov 14, 2013

  • 806 views

The accuracy, internal quality, and reliability of data is frequently referred to using the term 'data integrity'. Without it, data is less valuable or even useless. This session takes a close look at ...

The accuracy, internal quality, and reliability of data is frequently referred to using the term 'data integrity'. Without it, data is less valuable or even useless. This session takes a close look at what data integrity entails and how it can be enforced in multi-tier application architectures using distributed data sources and global transactions. The discussion will make clear which elements are required from any robust implementation of data oriented business rules aka data constraints and it will explain how most existing solutions are not as watertight as is frequently assumed. Steps for achieving reliable constraint enforcement are demonstrated.

Summary
- what is data integrity
- types of data constraints (and various levels: attribute, record, inter-entity)
- what is the notion of a transaction (and a commit)
- data constraint enforcement in various tiers of enterprise applications: user interface (client side), web tier, business service, database
- what are the challenges for implementing data integrity in a multi user environment; what are the additional challenges in an environment with multiple independent data sources
- demonstrate a common implementation of data integrity - starting at the UI and adding additional enforcement working our way down through the tiers
- make clearly visible how because of multi-session, data caching, clustering etc. most implementations look reasonable enough but lack robustness
- explain and demonstrate how some degree of locking is required to provide true data integrity in a multi-session environment; explain what the finest grained level of locking should be and how that can be implemented.

Statistics

Views

Total Views
806
Views on SlideShare
573
Embed Views
233

Actions

Likes
1
Downloads
9
Comments
1

12 Embeds 233

http://technology.amis.nl 190
http://cloud.feedly.com 21
http://newsblur.com 4
http://xianguo.com 3
http://www.feedspot.com 3
http://www.newsblur.com 3
http://inoreader.com 2
http://www.linkedin.com 2
http://feedly.com 2
https://www.commafeed.com 1
http://localhost 1
http://webcache.googleusercontent.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

11 of 1 previous next

  • IsidroBelln Isidro Bellón, Software Analyst Developper at SIVSA Thank you Lucas.

    Your slides are enough good, interesting and understanding.
    The Transactions Control is the most problem. I always found this problem in my diferent projects.
    Next Monday at work I'll study again your slides slowly.

    Regards,
    5 months ago
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Data Integrity in Java Applications (JFall 2013) Data Integrity in Java Applications (JFall 2013) Presentation Transcript