[Home] [By Thread] [By Date] [Recent Entries]

  • To: "Bullard, Claude L \(Len\)" <len.bullard@i...>,"Cox, Bruce" <Bruce.Cox@U...>,"Michael Champion" <mc@x...>,"XML Developers List" <xml-dev@l...>
  • Subject: RE: Are people really using Identity constraints specif ied in XML schema?
  • From: "Joshua Allen" <joshuaa@m...>
  • Date: Tue, 24 Aug 2004 10:15:44 -0700
  • Thread-index: AcSJ9yv1Dbpqct0RQESw59TQsQ+MgwABiTiQ
  • Thread-topic: Are people really using Identity constraints specif ied in XML schema?

> Some background:  a public safety system can be seen as 
> multiple information ecosystems and technologies that 
> exchange information to prevent crime, solve crime, and 

Yes, people thinking about "systems" often tend to think in terms of a
big machine, and deemphasize the characteristics of a dynamic system of
interacting pieces.  The various and incompatible methods used to hook
all of this stuff together, and the combinatorial complexity leads to
some interesting situations.  The complexity comes in at the
interconnections, and the same complexity that makes it hard to build
the system is what also makes it difficult to stop the hacker who puts
Ted Kennedy's name on the terror watch list three times.

Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member