Questions tagged [data-integrity]
The data-integrity tag has no summary.
                24 questions
            
            
            
                1
            
            vote
        
        
            
                2
            
            answers
        
        
            
                138
            
            views
        
        
            
            
        Designing persistence guarantees in an ingestion pipeline with a non-customizable intermediary
                    I’m migrating a large volume of historical RRD data into a VictoriaMetrics cluster.
By design, vminsert buffers and asynchronously forwards data to vmstorage. This makes it unclear when data is ...
                
            
       
        
            
                3
            
            votes
        
        
            
                1
            
            answer
        
        
            
                127
            
            views
        
        
            
            
            
        Constraint to enforce pairwise distinctness of values in two columns in table
                    I'm kind of stumped by a seemingly simple problem in Db design, but the more I think about about it, the more it twists my mind.
Let's say I have columns C1 and C2 in a table. How do I enforce that ...
                
            
       
        
            
                -2
            
            votes
        
        
            
                3
            
            answers
        
        
            
                273
            
            views
        
        
            
            
            
        How to present serious flaws in third-party software to non-technical users
                    We have third party software being tested. Our software has to interface with this, hence my involvement. There are some things I consider serious technical flaws. I'd like to communicate these things ...
                
            
       
        
            
                0
            
            votes
        
        
            
                2
            
            answers
        
        
            
                148
            
            views
        
        
            
            
            
        When reconstructing file B from file A and a binary difference B-A, given that A and B-A are correct, do we still need to verify the integrity of B?
                    In the context of a software update system, suppose we have the following:
a.tar: an archive file containing an old version of an application
b-a.patch: a file containing the binary difference of the ...
                
            
       
        
            
                0
            
            votes
        
        
            
                3
            
            answers
        
        
            
                276
            
            views
        
        
            
            
            
        In data engineering, why is data integrity checked on the DW rather than on the data sources?
                    I'm a software developer and new to data engineering, so this may be a newbie question, but I'm wondering why data integrity checks (for instance, dbt tests) are ran on the data warehouse, rather than ...
                
            
       
        
            
                0
            
            votes
        
        
            
                2
            
            answers
        
        
            
                204
            
            views
        
        
            
            
            
        How to verify that a legitimate (but unknown) remote asset from an unknown source has not been compromised and that its integrity remains intact?
                    I am familiar with and see the benefits of Subresource Integrity (SRI).
I understand that with SRI, once you've added a script reference with the correct integrity attribute, if the remote script is ...
                
            
       
        
            
                -2
            
            votes
        
        
            
                1
            
            answer
        
        
            
                438
            
            views
        
        
            
            
            
        DDD Best way to preserve integrity of entity
                    I have an entity that contain the status of data (WaitingForData, ReadyForData, DataUsed).
class Batch
{
    int Status { get; }
    DateTime StartTime { get; }
    string Code { get; }
    void ...
                
            
       
        
            
                1
            
            vote
        
        
            
                0
            
            answers
        
        
            
                58
            
            views
        
        
        Best way to store webshop item data as a snapshot when an order is created
                    I'm designing the architecture of my application and I'm running into an issue. For the webshop every Order entity has a relationship with a Store and many StoreItem's. This allows for quick fetching ...
                
            
       
        
            
                11
            
            votes
        
        
            
                6
            
            answers
        
        
            
                4k
            
            views
        
        
            
            
        Is CRC pointless if I'm doing truncated HMAC?
                    I am currently designing a communication protocol for an embedded system. I've decided that authentication (but not encryption) is important, so I decided to add 4 bytes of truncated HMAC signature to ...
                
            
       
        
            
                -3
            
            votes
        
        
            
                1
            
            answer
        
        
            
                110
            
            views
        
        
            
        what is event based data integration? [closed]
                    Please help me to understand what is event based data integration in simple layman term with some examples?
How it is different from other form of data integration.
Some sample use cases will be ...
                
            
       
        
            
                5
            
            votes
        
        
            
                5
            
            answers
        
        
            
                2k
            
            views
        
        
            
            
            
        Relational integrity without relations
                    I have about 15 years software engineering experience, writing business software with relational databases. Mainly SQL Server and Oracle. I've always been of the opinion that you should define ...
                
            
       
        
            
                3
            
            votes
        
        
            
                1
            
            answer
        
        
            
                117
            
            views
        
        
            
            
        Is it possible to spoof a recipient in a SMTP transaction? If not how does SMTP prevent this from happening?
                    Is it possible to have a scenario where there are 3 email addresses. Each on a different mail server.
[email protected]
[email protected]
[email protected]
Charlie writes an email with Alice and ...
                
            
       
        
            
                0
            
            votes
        
        
            
                1
            
            answer
        
        
            
                210
            
            views
        
        
            
        Design/Process in respect to mission-critical systems (Web Services)
                    Overview
For company abc, teams are separated in terms of mission-critical applications and their extended applications. For example, customer xyz uses mission-critical data, but there are business ...
                
            
       
        
            
                2
            
            votes
        
        
            
                1
            
            answer
        
        
            
                167
            
            views
        
        
            
            
            
        User identity between two services
                    Our team has hired freelancers for creating a website.
They did their job well, but now we want to add services for our core 
product using different server and technologies, but we want user
...
                
            
       
        
            
                12
            
            votes
        
        
            
                2
            
            answers
        
        
            
                401
            
            views
        
        
            
            
        How do you design your software that updates several microservices, if one of them fails?
                    Is there a design pattern or practice I can use to help with services that are either down or go down, while others are stable?
What if I have three microservices, and two of them are good, and one ...
                
            
       
         
         
         
         
         
        