Articles

SQLServerCentral Article

Unifed Database Toolkit - Connection Definition

SQL Server 2000 is easy to administer relative to other RDBMS, but there is still plenty of room for improvement. Author Andre Vigneau has built a database toolkit to allow him to manage his cross platform databases. This is the second article in his series and deals with establishing connections to any database platform.

You rated this post out of 5. Change rating

2004-12-01

5,405 reads

SQLServerCentral Article

Moving System Databases - A Checklist

The default location for the SQL Server system databases doesn't always meet the standards of many organizations. Author Chris Hedgate has taken the time to put together a short checklist on how you can move the master, msdb, model, and tempdb databases easily.

(4)

You rated this post out of 5. Change rating

2004-11-30

21,847 reads

SQLServerCentral Article

Reduce Database RoundTrips Using XML

SQL Server 2000 added XML support to allow some basiuc manipulation of XML data. At the time, XML was a hot buzzword in the computer industry and there were lots of applications being written to use XML. While the buzz has cooled, Jon Winer still uses XML in some interesting ways to make his life easier and his applications more rebust. Here he brings us a technique he's used to reduce the number of round trips required by an application.

You rated this post out of 5. Change rating

2004-11-29

9,433 reads

Technical Article

Data Sanitization Techniques

Data Sanitization is the process of making sensitive information in non-production databases safe for wider visibility. This White Paper is an overview of various techniques which can be used to sanitize sensitive production data in test and development databases.

2004-11-29

1,885 reads

Technical Article

Common Vulnerabilities in Database Security

Creating an enterprise security plan is a complex endeavour. It involves evaluating multiple threats that gain access through many network paths to a hodgepodge of different applications and systems. With the focus on systems and paths, databases are frequently overlooked. Securing the database should be a fundamental tenet for any security practitioner when developing his or her security plan. The database is the source of data, the "crown jewels" in the information economy. Any security effort must start with this in mind and end with the strongest level of controls applied at the database layer.

2004-11-26

2,129 reads

Technical Article

Building a 24 x 7 Database

Over the last few years, corporations have invested billions of dollars to integrate the automations of core business systems in large ERP applications. This paper looks at the risk of downtime and solutions for building an around-the-clock database.

2004-11-24

2,129 reads

Blogs

T-SQL Tuesday #196 – Two risky career decisions I made

By

The T-SQL Tuesday topic this month comes James Serra. What career risks have you...

T-SQL Tuesday #192: What career risks have you taken?

By

This T-SQL Tuesday is hosted by the one and only James Serra – literally...

T-SQL Tuesday #196: Taking Risks

By

This month we have a new host, James Serra. I’ve been trying to find...

Read the latest Blogs

Forums

OPENQUERY Flexibility

By Steve Jones - SSC Editor

Comments posted to this topic are about the item OPENQUERY Flexibility

A Full Shutdown

By Steve Jones - SSC Editor

Comments posted to this topic are about the item A Full Shutdown

Going Native with Fabric Spark Pools: The Fabric Modern Data Platform

By John Miner

Comments posted to this topic are about the item Going Native with Fabric Spark...

Visit the forum

Question of the Day

OPENQUERY Flexibility

Which of these are valid OPENQUERY() uses?

See possible answers