2011-11-14
1,982 reads
2011-11-14
1,982 reads
2011-10-12
2,206 reads
2011-10-05
2,448 reads
The third article in our series on normalization from Tom Thomson continues with an explanation on what constitutes third normal form.
2011-07-28
8,281 reads
In this article Tom Thomson takes a look at what second normal form means, how it is violated, and how you can fix it. This is part of our normalization series.
2011-07-14
8,012 reads
Learn the basics of first normal form and what that means to a database designer from Tom Thomson.
2011-06-30
10,800 reads
2011-01-11
2,741 reads
2010-06-24
3,969 reads
2010-04-23
3,898 reads
By Brian Kelley
In information security (INFOSEC), there several foundational concepts and principles. One of the ones...
By Steve Jones
the standard blues– n. the dispiriting awareness that the twists and turns of your...
By Chris Yates
A brief introduction to the tool and its advantages for database migrations DevOps is...
I'm tracing activity on one database and would like to include the client_app_name in...
select Custno, Addr1, City, Res_Phone, Bus_Phone, Fax_Phone, Marine_Phone, Pager_Phone, Other_Phone, email1, email2 from customer...
I'm only processing 50,000 records not everything from the Table where there are 250,00...
I want to mark a transaction in the log as a recovery point. How do I do this in my code if I use the transaction, myTran?
See possible answers