Feeds

Mind your languages with Microsoft LINQ

Data-access sticking plaster?

High performance access to file storage

The application developer-centric approach is to make the database - or any source of data - look like a data structure in an application, which is how LINQ addresses the problem. The database-centric approach has always been that the application developer has to learn SQL.

Given that Hejlsberg has mainly worked on the application language side, it is not surprising that he favors the former approach and, given his experience, these views are well worth very taking seriously.

It just isn't that simple, though. For a start, it can be argued that LINQ is a solution to a problem that shouldn't exist. For example, Hejlsberg has argued that application developers currently: "Have to learn database languages such as SQL and what comes with it, such as stored procedures and data types, while also mastering programming languages such as C#, VisualBasic or even Java."

In a well-designed database it is possible to use features like stored procedures to completely shield the application developer from the tables and therefore the need to write SQL.

To try to forestall comments pointing out that most databases are not well designed and that a knowledge of SQL is essential in order to reach the data therein, I'd like to say: "I know - I agree". But that doesn't stop people arguing that LINQ is treating the symptom, not the disease. Instead of applying the LINQ plaster to the gaping wound, we should be making it easier to create an abstraction layer in the database. Application programmers could then write against that layer rather than the actual tables.

This would also address another criticism leveled at LINQ, which is that whilst it isn't SQL, it still writes directly to the tables. As soon as the table structure is altered, the application breaks.

The bottom line is that it is impossible to know as yet whether LINQ will succeed or fail; ultimately that will depend on whether application developers use it or not. The fact that Microsoft is behind LINQ will encourage some and discourage others. The support of Hejlsberg will influence yet others, myself included, to at least give it a go.®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.