• http://www.crockford.com/ec/dining.html

    While not specifically about database, it's a good story about concurrency and security. It gives the reader a nice introduction into a capability-based access methodology. I wonder if more developers embraced this strategy how differently applications would be built from the ground up. We all agree that security must be built-in from start and not glued-on at the end, right?