Articles

SQLServerCentral Article

All About Transactions - Part 3

Transactions in SQL Server are probably no more complicated than those in other RDBMS products, which is to say they are fairly complex. Don Peterson continues with part 3 of his series and takes a look at transaction isolation levels and how they interact with multiple connections and their impact on locking.

(9)

You rated this post out of 5. Change rating

2004-12-02

15,937 reads

SQLServerCentral Article

Unifed Database Toolkit - Connection Definition

SQL Server 2000 is easy to administer relative to other RDBMS, but there is still plenty of room for improvement. Author Andre Vigneau has built a database toolkit to allow him to manage his cross platform databases. This is the second article in his series and deals with establishing connections to any database platform.

You rated this post out of 5. Change rating

2004-12-01

5,404 reads

SQLServerCentral Article

Moving System Databases - A Checklist

The default location for the SQL Server system databases doesn't always meet the standards of many organizations. Author Chris Hedgate has taken the time to put together a short checklist on how you can move the master, msdb, model, and tempdb databases easily.

(4)

You rated this post out of 5. Change rating

2004-11-30

21,838 reads

SQLServerCentral Article

Reduce Database RoundTrips Using XML

SQL Server 2000 added XML support to allow some basiuc manipulation of XML data. At the time, XML was a hot buzzword in the computer industry and there were lots of applications being written to use XML. While the buzz has cooled, Jon Winer still uses XML in some interesting ways to make his life easier and his applications more rebust. Here he brings us a technique he's used to reduce the number of round trips required by an application.

You rated this post out of 5. Change rating

2004-11-29

9,433 reads

Technical Article

Data Sanitization Techniques

Data Sanitization is the process of making sensitive information in non-production databases safe for wider visibility. This White Paper is an overview of various techniques which can be used to sanitize sensitive production data in test and development databases.

2004-11-29

1,885 reads

Technical Article

Common Vulnerabilities in Database Security

Creating an enterprise security plan is a complex endeavour. It involves evaluating multiple threats that gain access through many network paths to a hodgepodge of different applications and systems. With the focus on systems and paths, databases are frequently overlooked. Securing the database should be a fundamental tenet for any security practitioner when developing his or her security plan. The database is the source of data, the "crown jewels" in the information economy. Any security effort must start with this in mind and end with the strongest level of controls applied at the database layer.

2004-11-26

2,129 reads

Blogs

4 CPE Opportunity (Virtual) for Charity

By

Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...

Data Céilí 2026 Call for Speakers!

By

Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...

Streamlining Azure VM Moves Into Availability Zones

By

One of the more frustrating aspects about creating an Azure virtual machine is that...

Read the latest Blogs

Forums

Deadlock graph anomaly

By Databae

I've come across what appears to be a strange deadlock anomaly. As seen in...

Stairway to Azure SQL Hyperscale Level 6: Backup and Restore Internals

By Chandan Shukla

Comments posted to this topic are about the item Stairway to Azure SQL Hyperscale...

The Challenge of AI

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Challenge of AI, which...

Visit the forum

Question of the Day

Deprecated Feature Tracking

From T-SQL, without requiring an XEvent session, can I tell which deprecated features are being used on my instance?

See possible answers