Additional Articles


External Article

Column-Level Encryption in SQL Server

Beginning with SQL Server 2005, column-level encryption and decryption capabilities were made available within the database, providing a solution for situations where one-off types of data need to be secured beyond your existing authorization, authentication or firewall settings. This article provides an overview and example of securing a column using native SQL Server cryptography functions.

2011-02-18

4,894 reads

External Article

Avoid External Dependencies in SQL Server Triggers

I sometimes want to perform auditing or other actions in a trigger based on some criteria. More specifically, there are a few cases that may warrant an e-mail; for example, if a web sale takes place that requires custom or overnight shipping and handling. It is tempting to just add code to the trigger that sends an e-mail when these criteria are met. But this can be problematic for two reasons: (1) your users are waiting for that processing to occur, and (2) if you can't send the e-mail, how do you decide whether or not to roll back the transaction, and how do you bring the problem to the attention of the administrator?

2011-02-14

2,819 reads

External Article

SQL Azure - Creating backups and copies of your databases

As a DBA you always followed a practice to back up your database (or take a snapshot of your database) before making any changes so that you can revert to your old database state if something goes wrong. Also to setup a development or test environment you use a backup of your database and restore it in the respective environment. If you are moving to SQL Azure, what would you do in these cases as backup / restore and database snapshots are not supported as of now?

2011-02-10

3,731 reads

External Article

Re-generating SQL Server Logins

SQL Server stores all login information on security catalog system tables. By querying the system tables, SQL statements can be re-generated to recover logins, including password, default schema/database, server/database role assignments, and object level permissions. A comprehensive permission report can also be produced by combining information from the system metadata.

2011-02-08

5,514 reads

Blogs

Agentic Architect – Future IT Roles (comparison)

By

These days everything is changing to AI World, IT roles are getting changed and...

PlanTrace: Stop Reading Redshift EXPLAIN Plans. Start Seeing Them

By

PlanTrace: Stop Reading Redshift EXPLAIN Plans. Start Seeing Them Introducing PlanTrace — a free, browser-based...

A Cloud Dependency Failure from Amazon

By

I went to sleep while reading a Kindle book on my phone. I know...

Read the latest Blogs

Forums

BCA KCP Kebon Jeruk Tlpn/wa (0853)73737551

By pawel.sowka

Komp, Jl. Taman Kb. Jeruk Jl. Meruya Ilir Raya No.Blok B 6, RT.1/RW.9, Srengseng,...

BCA KCU PURI INDAH Tlpn/wa (0853)73737551

By pawel.sowka

Gedung C3 Lt. 1-3 Komplek, Jl. Puri Indah Raya No.1-3 Blok 02, Kec. Kembangan,...

BCA KCU TAMAN DUTA MAS Tlpn/wa (0853)73737551

By pawel.sowka

ABC dan 11 H, Jl. Pangeran Tubagus Angke No.10, Jelambar Baru, Kec. Grogol petamburan,...

Visit the forum

Question of the Day

Creating a JSON Document III

I have this data in a table called dbo.NFLTeams

TeamID  TeamName       City             YearEstablished
------  --------       ----             ---------------
1       Cowboys        Dallas           1960
2       Eagles         Philadelphia     1933
3       Packers        Green Bay        1919
4       Chiefs         Kansas City      1960
5       49ers          San Francisco    1946
6       Broncos        Denver           1960
7       Seahawks       Seattle          1976
8       Patriots       New England      1960
If I run this code, how many rows are returned?
SELECT TOP 2 
  json_objectagg('Team' : TeamName)
FROM dbo.NFLTeams;

See possible answers