Feeds

Access isn’t a relational database

We're all related somehow

Secure remote control for conventional and virtual desktops

  1. If you are a hard-line relational theorist, you may feel that none of the mainstream database engines is strictly relational. In which case, Access is not relational.
  2. If you are consider the likes of Oracle, SQL Server, DB2 etc. to be relational then you are accepting a more ‘real world’ definition of relational and you now have to decide whether Access falls within that set.
  3. If you decide it doesn’t, then you have to be able to show that Access supports significantly less of the model.

One trap worth avoiding is the use of arguments such as “Access isn’t relational because:

  • “it doesn’t support transactions;
  • “it can’t handle enough data;
  • “it isn’t robust enough;
  • “it is too slow;
  • “when it crashes the data can become corrupt because it doesn’t log the transactions;
  • “it comes from Microsoft and those guys don’t know anything about robust systems;
  • “it can’t handle more than about five concurrent users without running like a dog.”

The problem here is that these characteristics have nothing whatsoever to do with the relational model. It is perfectly true that stability, speed, high concurrency and the ability to handle large data sets are all eminently desirable features of a relational database system. But to associate them with the underlying data model is to misunderstand, at a very fundamental level, what the relational model is about.

According to Date, “the relational model is concerned with three aspects of data: data structure, data integrity and data manipulation.” - An Introduction to Database Systems, Addison-Wesley. The model says nothing about performance, data volume, numbers of concurrent users etc.

Indeed, to use these arguments to support the view that Access is not relational is like saying "Penguins aren’t birds because they can’t fly.” Whilst it is true that many birds can fly, aerial navigation is not part of the formal spec. for Class Aves.

Internet Security Threat Report 2014

More from The Register

next story
Nexus 7 fandroids tell of salty taste after sucking on Google's Lollipop
Web giant looking into why version 5.0 of Android is crippling older slabs
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
SLURP! Flick your TONGUE around our LOLLIPOP – Google
Android 5 is coming – IF you're lucky enough to have the right gadget
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.