Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,530 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,530 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,241 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,298 reads
Forgive me for the title. Mentally I’m 12. When I started my current day...
By Steve Jones
One of the things a customer asked recently about Redgate Data Modeler was how...
By Steve Jones
For a number of years, we’ve produced the State of the Database Landscape report,...
Hi all, I've just had to roll back my SSMS 22 version from 22.3.0,...
Hi! I've been banging my head against the wall for 2 days now trying...
Comments posted to this topic are about the item The Power of Data and...
In SQL Server 2025, there is a new function that returns the current date without the time. What is it?
See possible answers