Questions tagged [data-integrity]

19 questions
24
votes
3 answers

Should UDP data payloads include a CRC?

For a company I used to work for, I had to implement a socket receiver that mostly took data in UDP form over a local connection from some specialized sensor hardware. The data in question was a well-formed UDP packet, but interestingly, the data…
Xenoprimate
  • 351
  • 1
  • 2
  • 6
12
votes
2 answers

How do you design your software that updates several microservices, if one of them fails?

Is there a design pattern or practice I can use to help with services that are either down or go down, while others are stable? What if I have three microservices, and two of them are good, and one dies right in the middle of a POST? Two will get…
johnny
  • 3,669
  • 3
  • 21
  • 35
11
votes
6 answers

Is CRC pointless if I'm doing truncated HMAC?

I am currently designing a communication protocol for an embedded system. I've decided that authentication (but not encryption) is important, so I decided to add 4 bytes of truncated HMAC signature to every packet. At the same time, I also want to…
9a3eedi
  • 2,101
  • 3
  • 23
  • 29
7
votes
3 answers

Are checksums in file formats obsolete?

In the context of a modern filesystem such as btrfs or ZFS, both of which checksum every piece of data written, is there any additional value in a file format storing internal checksums? I also note the case of where a file is transferred across a…
jl6
  • 413
  • 2
  • 10
6
votes
5 answers

Relational integrity without relations

I have about 15 years software engineering experience, writing business software with relational databases. Mainly SQL Server and Oracle. I've always been of the opinion that you should define relations in your database and let your database handle…
6
votes
3 answers

How do you deal with legacy data integrity issues when rewriting software?

I am working on a project which is a rewrite of an existing legacy software. The legacy software primarily consists of CRUD operations (create, read, update, delete) on an SQL database. Despite the CRUD-based style of coding, the legacy software is…
magnus
  • 664
  • 1
  • 5
  • 14
4
votes
3 answers

Should authorized users be allowed to add autocomplete suggestions to the list of symptoms?

I am developing an online medical website (similar to a HIS) whose users are hospitals specifically hospital administrators, doctors, and other staff authorized by the hospital to use the system. There are many hospitals that would use the website.…
James A
  • 157
  • 1
3
votes
1 answer

Is it possible to spoof a recipient in a SMTP transaction? If not how does SMTP prevent this from happening?

Is it possible to have a scenario where there are 3 email addresses. Each on a different mail server. alice@contoso.com bob@fabrikam.com charlie@treyresearch.net Charlie writes an email with Alice and Bob listed as recepients. Charlie uses a rogue…
Omkar Khair
  • 141
  • 3
2
votes
1 answer

User identity between two services

Our team has hired freelancers for creating a website. They did their job well, but now we want to add services for our core product using different server and technologies, but we want user identities to remain the same on the website as well as…
8bra1nz
  • 259
  • 1
  • 8
2
votes
2 answers

How can I keep data integrity across multiple services in a transaction-like fashion with PHP?

I find the concept of transactions really useful when working with databases because obviously it allows you to rollback changes if one step of a modification goes awry. Is there some way I can extend the same principle across multiple services?…
marked-down
  • 155
  • 6
2
votes
3 answers

Effect of denormalizing

Here's a scenario where I'm wondering whether to denormalize a relational database (MS SQL). Text description of the requirement I have users (stored in a users table). Users belong to Accounts: An account is created before its users are…
ChrisW
  • 3,387
  • 2
  • 20
  • 27
1
vote
0 answers

Best way to store webshop item data as a snapshot when an order is created

I'm designing the architecture of my application and I'm running into an issue. For the webshop every Order entity has a relationship with a Store and many StoreItem's. This allows for quick fetching of information when a user wants to view the…
1
vote
2 answers

Prevent creation of multiple entities

In an application I'm developing we have integrated with a third party api. One of the use cases consists of a user of our system filling out a form and submitting it. This results in us mapping the form to an api request model and posting it to the…
sara
  • 2,549
  • 15
  • 23
1
vote
1 answer

How is data integrity maintained in a clustered environment when schema changes?

Scenario A clustered environment running N identical application nodes interacting with a single relational database. Problem Is it possible to upgrade the nodes to a new application version, which requires a new database schema and maintain data…
Armand
  • 6,508
  • 4
  • 37
  • 53
0
votes
2 answers

How to verify that a legitimate (but unknown) remote asset from an unknown source has not been compromised and that its integrity remains intact?

I am familiar with and see the benefits of Subresource Integrity (SRI). I understand that with SRI, once you've added a script reference with the correct integrity attribute, if the remote script is subsequently compromised, then the SRI Hash will…
Rounin
  • 275
  • 1
  • 10
1
2