[prev in list] [next in list] [prev in thread] [next in thread] 

List:       kde-devel
Subject:    Re: Kash Kontinued.
From:       Stephan Kahnt <stephan.kahnt () ipk ! fhg ! de>
Date:       1999-11-03 13:27:59
[Download RAW message or body]

> On Sun, 31 Oct 1999, Corrin Lakeland wrote:
> 
> > Hi, I'm sending this to you directly because kde-devel doesn't like my From:
> > field.
> >
> > >>[Use a database]
> > >
> > >    I agree. But I envision an abstraction that allows for a number of
> > > different implementations. There would be an interface that rest of the
> > > program could talk to, and each storage type would implement the required
> > > features.
> >
> > Reading this,  ODBC sprang into mind and started flashing with lots of bells
> > ringing around it...
> >
> > >    Also, it may be that the user wants a number of databases open
> > > simultaniously (credit card, checking, etc.) and a way of organizeing this
> > > is necessary.
> >
> > No.  A user might want access to many TABLES, but they really should only need
> > one database.
> >
> > >    AND more than one part of the program may want to access the same
> > > information at once (regeister is open, yet the report wants to read the
> > > data also.) Coordinating this requires some thinking as well.
> >
> > Not really, Databases are very good at concurrency -- just have a look at
> > something like Date to see how much effort they go to.  Just as long as you
> > don't keep pointers yourself, it isn't every hard.
> >
> > >    BUT WAIT THERES MORE! The database layer should be as secure as
> > > possible. This is probably a storage method specific problem, but we need
> > > as part of our interface an abstraction for dealing with
> > > encription/password type stuff.
> >
> > Hmmm, hmmmmmm.... Nah, just leave it all to the database.  Databases have
> > concentrated on security for a long time now, they're much better at it than
> > you're ever going to be.  Provided you never go behind their back, their
> > security model is going to be bulletproof.  Really, the only thing you have to
> > be careful about is that the passwords for accessing the DB are dealt with
> > carefully (umask 377 on the config file).  The database will ensure the user
> > only gets access to what they are supposed to access.  Just don't try the
> > equivilant of suid too often and you won't have any trouble.
> >
> > Like most people on this list, my interest increased significantly when you
> > said you'd treat it as a SE project.  I've both taught SE and participated in
> > OpenSource development projects and I think the models are totally different,
> > though I'm looking forward to being proved wrong.
> >
> > SE believes in designing things correctly, building an implementation of that
> > design (called a prototype), and building a new design to fix whatever things
> > weren't liked about the prototype.  A lot of thought goes into design so that
> > you don't code something 'wrong'.  However, SE is aware that other approaches
> > exist, and even includes the model used by open source, under the label spiral
> > model.
> >
> > I really don't think any other model works for nontrivial open source
> > applications; design flaws WILL be present in version one, but the rewrite you
> > have to do for version two will get rid of them.  Reliability comes from
> > extensive reuse (80%?) and the code is studied by so many people, not from
> > careful planning.  Design flaws are also minimised by the philosophy of doing
> > each part well rather than rushing to get a complete product to market.  Have
> > you read the cathedral and the bazaar?
> >
> > Still, as I said above, I'm looking forward to being proven wrong :-)

Hi,

you say SE and OpenSource are totally different, but do you think they
are really contradictory? I think most of programmers don't know a lot
about SE. So they just start to code with a vague image of the structure
in mind. Nowadays there are powerfull tool (e.g. cvs) to support such a
proceeding. But isn't it much easyer to discuss the design in a mailing
list and have thus a kind of SE. I aggree, there is a danger of
overplaning. I suggest a compromise e.g. a time table to plan the
necessary steps. When it's time according to the time table, we could
start coding. I'd like to try it this way.

Stephan

-- 
----------------------------------------------------------------------
Stephan Kahnt
TU Berlin	Tel : ++49 30 39006-241
REMOVE NOSPAM	mail: stephan.kahnt@ipk.fhgNOSPAM.de
----------------------------------------------------------------------

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic