Articles

SQLServerCentral Article

Unifed Database Toolkit - Connection Definition

SQL Server 2000 is easy to administer relative to other RDBMS, but there is still plenty of room for improvement. Author Andre Vigneau has built a database toolkit to allow him to manage his cross platform databases. This is the second article in his series and deals with establishing connections to any database platform.

You rated this post out of 5. Change rating

2004-12-01

5,405 reads

SQLServerCentral Article

Moving System Databases - A Checklist

The default location for the SQL Server system databases doesn't always meet the standards of many organizations. Author Chris Hedgate has taken the time to put together a short checklist on how you can move the master, msdb, model, and tempdb databases easily.

(4)

You rated this post out of 5. Change rating

2004-11-30

21,848 reads

SQLServerCentral Article

Reduce Database RoundTrips Using XML

SQL Server 2000 added XML support to allow some basiuc manipulation of XML data. At the time, XML was a hot buzzword in the computer industry and there were lots of applications being written to use XML. While the buzz has cooled, Jon Winer still uses XML in some interesting ways to make his life easier and his applications more rebust. Here he brings us a technique he's used to reduce the number of round trips required by an application.

You rated this post out of 5. Change rating

2004-11-29

9,434 reads

Technical Article

Data Sanitization Techniques

Data Sanitization is the process of making sensitive information in non-production databases safe for wider visibility. This White Paper is an overview of various techniques which can be used to sanitize sensitive production data in test and development databases.

2004-11-29

1,885 reads

Technical Article

Common Vulnerabilities in Database Security

Creating an enterprise security plan is a complex endeavour. It involves evaluating multiple threats that gain access through many network paths to a hodgepodge of different applications and systems. With the focus on systems and paths, databases are frequently overlooked. Securing the database should be a fundamental tenet for any security practitioner when developing his or her security plan. The database is the source of data, the "crown jewels" in the information economy. Any security effort must start with this in mind and end with the strongest level of controls applied at the database layer.

2004-11-26

2,129 reads

Technical Article

Building a 24 x 7 Database

Over the last few years, corporations have invested billions of dollars to integrate the automations of core business systems in large ERP applications. This paper looks at the risk of downtime and solutions for building an around-the-clock database.

2004-11-24

2,129 reads

Blogs

Finding Balance: Things Will Come Up

By

I have a presentation on finding balance in your career that got quite a...

Who Are You Doing It For?

By

But as I've matured over the years, I came to realize that I needed...

Presenting Twice in May 2026

By

I will be presenting my latest session, Documenting Your Work for Worry-Free Vacations, in-person...

Read the latest Blogs

Forums

The day-to-day pressures of a DBA team, and how we can work smarter with automation and AI

By Terry Jago

Comments posted to this topic are about the item The day-to-day pressures of a...

Migrate SSRS Reports to PowerBI Report Server in SQL Server 2025

By Deepam Ghosh

Comments posted to this topic are about the item Migrate SSRS Reports to PowerBI...

Identities and Sequences III

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Identities and Sequences III

Visit the forum

Question of the Day

Identities and Sequences III

When thinking of the Identity property for auto incrementing columns and sequences for the same action, which can be used with the BIGINT data type?

See possible answers