This is why the questions now. The more I think about replication, the more
I hate the idea of getting the data back and forth with no problems. More
so, what kind of problems might there be by punching that hole in the
firewall. Is that just enough for a hacker to get into other stuff? I guess
simply having that physical connection to the internal network could allow a
break in if there are problems with the firewall. My thought is only
allowing traffic to HTTP or HTTPS to the i. We can then easily get data back
and forth.

--
Mike Wills
http://mikewills.me


On Wed, May 25, 2011 at 11:33 AM, Charles Wilt <charles.wilt@xxxxxxxxx>wrote:

However, I'm not a fan of replication....

Ideally you could have a library with stored procedures (or views)
accessible to the app and make sure that only those objects are
accessible to the app.

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.