Most large organizations do not want all end users querying their back-end databases because of the network traffic it creates as well as the impact on operational systems. How does CONNX handle this?
CONNX has an extensive security model, which allows database administrators to determine which tables are available for query usage by end users. Many customers use CONNX views, and limit the users to those views. This allows database administrators to control the types of queries being issued against the database, and minimize their impact by designing queries that take advantage of the existing indexes on the database tables. Regarding network traffic, CONNX is designed specifically to reduce network traffic by performing all possible data filtering on the database server, and only returning the results to the PC. Back to top You say that CONNX can deliver its functions “without major programming effort.” What programming is required? How is it deployed, etc.? programming effort”. What programming is required, how is it deployed etc? The use of CONNX is effortless. The installation and configuration of CONNX takes about 15 minutes. After that, you simply use a front-end report writer
Related Questions
- Most large organizations do not want all end users querying their back-end databases because of the network traffic it creates as well as the impact on operational systems. How does CONNX handle this?
- How large is amount of service traffic circulating within XdbE network while the network is idle (when there are no external requests and data provisions and all servers are synced)?
- How large is amount of service traffic circulating within XdbE network while the network is idle (when there are no external requests and data provisions and all servers are synced)?
- How can I set up additional schools with separate databases on an existing Large Network installation of Go Solve?
- How can I set up additional schools with separate databases on an existing Large Network installation of Go Solve?
- How can I monitor which user, PC, server in my network creates how much traffic and what type of traffic?