Identity | Data Model Meets World


Write Up


How can we make sure that all of our data remains uniquely identifiable as our applications grow and change? In this episode, Jeff Carpenter talks about how to implement identity techniques such as natural, surrogate and composite keys, and the strengths and weaknesses of each.

For a deeper look at this topic, read the associated blog post: Data Model Meets World, Part II: Identity Crisis.

No Exercises.
No FAQs.
No resources.
Comments are closed.