Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,531 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,531 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,242 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,300 reads
By HeyMo0sh
As a DevOps practitioner, I’ve always focused on performance, scalability, and automation. But as...
By Brian Kelley
On Patch Tuesday, in addition to OS and Office security patches, Microsoft also released...
When mirroring was first released for Azure SQL Database, it used Change Data Capture...
Comments posted to this topic are about the item Multiple Deployment Processes
Comments posted to this topic are about the item How to Use sqlpackage to...
Comments posted to this topic are about the item Upgrading Admin Queries
I have a query from a former DBA that we run on SQL Server 2025 to check on database metadata. This query references sys.sysaltfiles. I want to refactor this code to be more modern. Which DMV should I reference instead?
See possible answers