I would suggest that your proposed solution, to do it all in business logic, is correct most of the time. It has the advantage that if other processes are allowed modify the table, you don't detect a change by another process as making the field dirty.
If you can guarantee that no other process is allowed to access the DB, then your question is reasonable. I'd like to know the best answer myself: there have been a few topics recently about this, and they all admit to having to go back to the DB to check for dirty fields.
|