Securing SQL with access control and login monitoring
SQL Server login monitoring and access control are important elements of SQL database security. Learn how DDL triggers can help alert you to security issues.
2009-02-16
3,195 reads
SQL Server login monitoring and access control are important elements of SQL database security. Learn how DDL triggers can help alert you to security issues.
2009-02-16
3,195 reads
I have heard that the installation process for SQL Server 2008 differs from previous installation processes. So, how much different is the installation process? In this three-part tip series, we will review the installation process for SQL Server 2008, which differs quite a bit from SQL Server 2000 and SQL Server 2005 installations.
2009-02-16
3,753 reads
This month's installment of "MDX Essentials" examines the HIERARCHY_UNIQUE_NAME intrinsic member property. Join SSAS Architect Bill Pearson in an introduction of this intrinsic member property, which Bill complements with hands-on exercises and sample uses.
2009-02-13
1,582 reads
This article is part 1 of a 4 part series that explores the internals of SQL Server Integration Services. This series will focus on the SSIS architecture, buffer management, types of transformation, the execution tree and parallel processing.
2009-02-13
3,960 reads
This article takes a look at the great new auditing features available in SQL Server 2008.
2009-02-12
2,578 reads
This article is the final article of a 4 part series that explores the Features and Properties of SSIS. This article will explore Validation.
2009-02-11
2,663 reads
Joe discusses various factors to take into account when using temporal data such as Holidays, and discusses a few techniques using Calendar, Report Usage and History tables
2009-02-11
3,885 reads
This code sample programmatically creates a package with an OLE-DB Source and a Flat File Destination, and the resulting package exports data from SQL Server to a CSV file. The finished package just has the one Data Flow Task shown below.
2009-02-10
2,537 reads
SQL Server login monitoring and access control are important elements of SQL database security. Learn how DDL triggers can help alert you to security issues.
2009-02-10
2,594 reads
This tip shows you how to find security holes when aliased users are setup in your databases and also that this feature will be deprecated in SQL Server 2008.
2009-02-09
2,352 reads
Every organization I talk to has the same problem dressed up in different clothes....
By DataOnWheels
I am delighted to host this month’s T-SQL Tuesday invitation. If you are new...
By alevyinroc
Ten years (and a couple jobs) ago, I wrote about naming default constraints to...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item Using OPENJSON
Comments posted to this topic are about the item Data Modeling with dbt for...
I have some data in a table that looks like this:
BeerID BeerName brewer beerdescription 1 Becks Interbrew Beck's is a German-style pilsner beer 2 Fat Tire New Belgium Toasty malt, gentle sweetness, flash of fresh hop bitterness. 3 Mac n Jacks Mac & Jack's Brewery This beer erupts with a floral, hoppy taste 4 Alaskan Amber Alaskan Brewing Alaskan Brewing Amber Ale is an "alt" style beer 8 Kirin Kirin Brewing Kirin Ichiban is a Lager-type beerIf I run this, what is returned?
select t1.key
from openjson((select t.* FROM Beer AS t for json path)) t1 See possible answers