Articles

External Article

SQL Server 2005 Security - Part 2 Authorization

Following the discussion of new or enhanced authentication-related functionality in SQL Server 2005 Beta 2 in our previous article, we are shifting our focus to authorization features, which determine the level of access rights once the user's logon process is successfully completed. Among topics that will be covered here, are separation of user and schema, modifiable context of module execution, increased permission granularity, and improved catalog security.

2005-03-08

3,832 reads

SQLServerCentral Article

Netlib Encryptionizer Review

SQL Server 2000 has a weak point in how it handles security. SA can see everything, a notion that disturbs many people, especially those that have data security requirements. Netlib has a great product that allows you to encrypt columns, tables, or databases in a way that is seemless to your application. Dale Corey takes a look at this product and how you might use it in your application.

You rated this post out of 5. Change rating

2005-03-07

8,015 reads

Technical Article

Changing XML Schema attached in SQL Server 2005

XML has become an first class datatype in SQL Server 2005 . You can check my previous articles for an idea of XML features introduced. In this article we will take a look at how we can alter a XML Schema attached to an Typed XML data. XML's can be caegorized into two categories, typed and un-typed. Any XML that conforms to an XML schema is called as typed. And on the contrary plain XML strings are called as un-typed.

2005-03-07

1,042 reads

External Article

Replicating Identity columns in SQL Server - Customizing replication

When transactional replication is used for high availability purposes, such as if you want the applications to access the replicated server when the primary database server fails, one of the hurdles SQL Server database administrators face when configuring replication is tables with identity columns.

In this article, I am going to discuss how to customize the replication in order to make the subscription database look identical to the publishing database, so that when there is a failure in the primary server, it is simple to fail over to the subscription database.

2005-03-07

2,807 reads

Technical Article

Data Mining Reloaded

The two main functions of data mining are classification and prediction (or forecasting). Data mining helps you make sense of those countless gigabytes of raw data stored in databases by finding important patterns and rules present in the data or derived from it. Analysts then use this knowledge to make predictions and recommendations about new or future data. The main business applications of data mining are learning who your customers are and what they need, understanding where the sales are coming from and what factors affect them, fashioning marketing strategies, and predicting future business indicators.

2005-03-04

2,425 reads

Technical Article

The Insight Reports: Grid Computing

In the two years since Insight's last examination of the topic, grid computing has moved out of the laboratory and into mainstream commercial applications. No longer the exclusive tool of researchers seeking to harness enough compute power for massive computational challenges such as weather modeling or weapons test simulations, today grids are being deployed in more traditional commercial computing applications. For example, commercial computing stalwarts IBM, Intel, Hewlett-Packard (HP) and Sun recently announced they were forming the Globus Consortium to drive the technology into the mainstream for applications such as financial analysis, oil exploration and pharmaceutical testing. And within the technical community, new standards being developed called the Web Services Resource Framework (WSRF) will foster convergence of the Web service and grid computing communities, which in the years ahead is likely to have a major impact on quality and diversity of Web services.

2005-03-04

1,107 reads

External Article

MSSQL Server 2000 Reporting Services : Black Belt Administration: Exec

We introduced our previous article, Prepare the Execution Log for Reporting, with a discussion about a valuable source of information for performance and auditing analysis, identifying the Report Server Execution Log as a great place to start for this sort of reporting. We noted that the Execution Log captures data specific to individual reports, including when a given report was run, identification of the user who ran it, delivery destination of the report, and which rendering format was used, among other information.

2005-03-02

2,384 reads

Blogs

Becoming a creator, my website experience

By

Over the past few months, I have debated starting a new blog to discuss...

T-SQL Tuesday #192 Invitation: SQL Server 2025 Excitement

By

It’s that time of the month again, and once again, I’m late and I’m...

The Book of Redgate: What Our Customers Say

By

This is from 2010, but I loved that people felt this way about Redgate...

Read the latest Blogs

Forums

fast farward curson vs while loop on @table

By rajemessage 14195

hi, need to known weather fast farwand cursor is faster than a while loop...

Economics of AI: What is the Real Cost to Profit?

By dbakevlar

Comments posted to this topic are about the item Economics of AI: What is...

Poor Name Choice

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Poor Name Choice

Visit the forum

Question of the Day

Getting the Indexed Columns

I run this code on SQL Server 2022 to get a list of all the indexes and their key columns. What is returned?

SELECT   
    INDEX_COL (N'AdventureWorks2017.Sales.SalesOrderDetail')

See possible answers