Archives: August 2016
First things first the DMA is a replacement of the Upgrade Adviser. In fact it’s an upgrade of the Upgrade Adviser. It has some amazing new features.
- You can install…
There has been a long standing debate over the use of a natural primary key vs an artificial one. I thought I would throw in my two cents.
First of all why is it important? The primary key is used for two major purposes.
The primary key is one… Read more
Continuing my exploration of Azure the next logical step seemed to be copying an on-premise database up to the cloud. This is also the next in the ideas I got while watching Jes Borland’s (b/t) excellent session on Azure and SQL Server on the Pass Data… Read more
In case you hadn’t noticed I’ve recently started looking at the cloud and what it entails. Well one of those aspects (duh) is security. I’m not sure where I found this (probably someone tweeted it) but one MS has put out a document on the subject (again duh) called Microsoft… Read more
Many years ago Jeff Moden (of SQL Server Central fame) came up with the concept of RBAR. Row-By-Agonizing-Row. At it’s most basic it means you are inserting one row at a time. A more broad interpretation says it’s any type of loop even the type caused by a recursive CTE. Read more
Possibly the single most influential event in my career happened over 25 years ago. I lost my temper at a client.
The client had requested a meeting. They had a new, complex, system they wanted implemented in the software we managed for them. The client was very very excited. I… Read more
Yep, that’s right, you heard me. Write-Only not Read-Only. I was presenting SQL Server Security Basics at NTSSUG the other night and there was an interesting discussion on the idea of granting someone write permissions without corresponding read permissions.
So for example:
-- Setup code CREATE LOGIN WriteOnlyUser WITH…
If you want to blog T-SQL Tuesday is a great way to get started. On the first Tuesday of each month (or possibly a bit earlier as in this case) someone presents a blogging idea. Everyone who wants to participate then comes up with something on that subject and posts… Read more
A DBA walked into a bar, saw a couple of tables, and asked “Can I JOIN you?”
I use impersonation on a regular basis for a number of different tasks. This one is pretty basic but can make a big difference in how you handle security. Let’s use a very basic task as an example.
A developer wants to be able to truncate a table.
This isn’t… Read more