Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note

Usage events are good to use as a control mechanism for the aggregation database to check if duplicate events are harvested. The provenance information of the repository can be found in the <resolver> element, see section 4.1.6. - Peter

Note

Some internet fora argue that the same MD5 hash can be produced by the same strings, thus not globally unique, and thus cannot be used as a primary key in a global system. SHA-1 is a better method for encrypting the content (better protection against IP address hacking??), some prefer GUID's/UUID's for better global uniqueness. Others say that MD5 collisions occur very rarely. http://stackoverflow.com/questions/221165/pros-and-cons-of-using-md5-hash-of-uri-as-the-primary-key-in-a-databaseImage Added

Occurences of child elements in <context-object>

...