Articles

SQLServerCentral Article

Unifed Database Toolkit - Connection Definition

SQL Server 2000 is easy to administer relative to other RDBMS, but there is still plenty of room for improvement. Author Andre Vigneau has built a database toolkit to allow him to manage his cross platform databases. This is the second article in his series and deals with establishing connections to any database platform.

You rated this post out of 5. Change rating

2004-12-01

5,404 reads

SQLServerCentral Article

Moving System Databases - A Checklist

The default location for the SQL Server system databases doesn't always meet the standards of many organizations. Author Chris Hedgate has taken the time to put together a short checklist on how you can move the master, msdb, model, and tempdb databases easily.

(4)

You rated this post out of 5. Change rating

2004-11-30

21,845 reads

SQLServerCentral Article

Reduce Database RoundTrips Using XML

SQL Server 2000 added XML support to allow some basiuc manipulation of XML data. At the time, XML was a hot buzzword in the computer industry and there were lots of applications being written to use XML. While the buzz has cooled, Jon Winer still uses XML in some interesting ways to make his life easier and his applications more rebust. Here he brings us a technique he's used to reduce the number of round trips required by an application.

You rated this post out of 5. Change rating

2004-11-29

9,433 reads

Technical Article

Data Sanitization Techniques

Data Sanitization is the process of making sensitive information in non-production databases safe for wider visibility. This White Paper is an overview of various techniques which can be used to sanitize sensitive production data in test and development databases.

2004-11-29

1,885 reads

Technical Article

Common Vulnerabilities in Database Security

Creating an enterprise security plan is a complex endeavour. It involves evaluating multiple threats that gain access through many network paths to a hodgepodge of different applications and systems. With the focus on systems and paths, databases are frequently overlooked. Securing the database should be a fundamental tenet for any security practitioner when developing his or her security plan. The database is the source of data, the "crown jewels" in the information economy. Any security effort must start with this in mind and end with the strongest level of controls applied at the database layer.

2004-11-26

2,129 reads

Blogs

Using CAT for Testing of Data Agents

By

In last months one of the scenarios where you can use AI has been...

Are you getting value from your reporting?

By

Do you spend so long manipulating your data into something vaguely useful that you...

The Book of Redgate: SQL Server Central

By

It was neat to stumble on this in the book, a piece by me,...

Read the latest Blogs

Forums

Fun with JSON

By ateraa

Comments posted to this topic are about the item Fun with JSON

Creating JSON II

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Creating JSON II

Engineer Lessons

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Engineer Lessons

Visit the forum

Question of the Day

Creating JSON II

On SQL Server 2025, what happens when I run this code:

SELECT JSON_OBJECTAGG( N'City':N'Denver' RETURNING JSON)
GO

See possible answers