Articles

Technical Article

Techniques for Uniquely Identifying Database Records

When designing and creating a data model for a data-driven application, the records in tables must each be uniquely identifiable. By having a unique value associated with each record, individual records can be selected, updated, or deleted. Being able to uniquely identify records is so important and standard in a database system that databases allow those designing a database table to specify what column (or columns) make up the primary key.

2006-12-22

3,518 reads

External Article

Tales of Corporate Espionage

All good detective stories have a femme fatale. In the case of corporate espionage scandals, Celia Goodson, a seasoned businesswoman and once a glossily groomed blonde, has been involved in investigating more business transgressions to hit the City in the last three decades than anyone else of her years.

2006-12-21

2,627 reads

SQLServerCentral Article

Free Phil Factor eBook: Confessions of an IT Manager

Download a 108-page eBook in which Phil Factor lifts the lid on the victories, defeats and absurdities of a career spent in the rough-and-tumble of the IT industry. The paperback will to available to buy from Lulu.com shortly ($25), but the eBook is free for registered Simple-Talk.com users

You rated this post out of 5. Change rating

2006-12-18

2,527 reads

Technical Article

CLR Inside Out

This article is meant to explore these architectural issues from the bottom up, and aims to guide you through this new world. In the long run, new programming models are likely to appear that will abstract away a lot of the challenges you will encounter.

2006-12-15

2,929 reads

Technical Article

New SQL Truncation Attacks And How To Avoid Them

In this article I will discuss some new ideas that can result in either modifying SQL statements or injecting SQL code even if the code has escaped the delimiting characters. I will start with some best practices for constructing delimited identifiers and SQL literals, and then I'll show you new ways attackers can inject SQL code in order to help you protect your applications.

2006-12-14

4,373 reads

Blogs

Monday Monitor Tips: The Jobs Report

By

A customer wanted a report they could email to their boss about jobs, something...

Automating SQL Maintenance: How DevOps Principles Reduce Downtime

By

In the world of modern data infrastructure, SQL databases remain the backbone of enterprise...

From Couch-Potato to Triathlete – and What This Means for Your SQL Server

By

Do you know if your SQL Server is really running at its best? To...

Read the latest Blogs

Forums

Find Invalid Objects in SQL Server

By Nisarg Upadhyay

Comments posted to this topic are about the item Find Invalid Objects in SQL...

Single User SQL Server on Linux

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Single User SQL Server on...

All the Costs of Downtime

By Steve Jones - SSC Editor

Comments posted to this topic are about the item All the Costs of Downtime

Visit the forum

Question of the Day

Single User SQL Server on Linux

How can I start SQL Server on Linux in single-user mode to restore the master database?

See possible answers