Loyalty Cards
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
2009-08-06
465 reads
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
2009-08-06
465 reads
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
2009-08-06
726 reads
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
2009-08-06
482 reads
Part two of his series on table schema changes, this article examines those changes that affect the actual data. Read this great article from Alok Dwivedi.
2009-08-05
5,180 reads
Full/partial schema refreshes across environments are a regular requirement in databases. This article builds on a previous article, providing scripts to disable and re-enable foreign key constraints on all of the tables in a schema.
2009-08-05
3,175 reads
In his previous article “Hyper-V, an introduction” Jaap Wesselius explained about the Hypervisor, the parent partition, the child partition, and Integration Components. In this article Jaap discusses installing Hyper-V, all kinds of Virtual Hard Disks, Virtual Networks, and some best practices.
2009-08-05
2,325 reads
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
2009-08-05
616 reads
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
2009-08-05
667 reads
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
2009-08-05
447 reads
This article is an attempt to explain the application of new XML support in SQL Server 2005 for efficient data storage and performance.
2009-08-04
4,172 reads
By Steve Jones
We had an interesting discussion about deployments in databases and how you go forward...
By ChrisJenkins
You could be tolerating limited reporting because there isn’t an off the shelf solution...
A while back I wrote a quick post on setting up key mappings in...
We want to setup a gateway db to host stored procedures which use tables...
Comments posted to this topic are about the item Lots of FKs
Comments posted to this topic are about the item Real-time On-prem SQL Server Data...
In SQL Server 2025, what are the most outgoing and incoming FK references a table can have?
See possible answers