Additional Articles


Technical Article

Software Tool Design: Design by Sketching

Developers can get so used to relying on computers for everything that they can forget how useful it can be in the design process to elicit and refine ideas whilst working in groups, using a sketchbook, pencils and crayons. Sometimes we all need a jolt to force us to take a different approach to solving software design problems.

(2)

You rated this post out of 5. Change rating

2008-08-29

3,357 reads

External Article

Using SET NULL and SET DEFAULT with Foreign Key Constraints

Cascading Updates and Deletes, introduced with SQL Server 2000, were such an important, crucial feature that it is hard to imagine providing referential integrity without them. One of the new features in SQL Server 2005 that hasn't gotten a lot of press from what I've read is the new options for the ON DELETE and ON UPDATE clauses: SET NULL and SET DEFAULT. Let's take a look!

2008-08-28

2,984 reads

External Article

Configure MaxTokenSize for SQL Server Authentication

DBA's and web developers at our company are experiencing issues with connecting to SQL instances using SQL Server Management Studio and other SQL tools using Windows Integrated Authentication. Our company is large, with well over 70,000 users and groups in Active Directory. When we look in the NT event log on the SQL Server we see both MSSQL and Kerberos errors. What could be causing this?

2008-08-25

3,296 reads

Technical Article

Concatenating Row Values in Transact-SQL

It is an interesting problem in Transact SQL, for which there are a number of solutions and considerable debate. How do you go about producing a summary result in which a distinguishing column from each row in each particular category is listed in a 'aggregate' column? A simple, and intuitive way of displaying data is surprisingly difficult to achieve. Anith Sen gives a summary of different ways, and offers words of caution over the one you choose.

(1)

You rated this post out of 5. Change rating

2008-08-22

4,249 reads

Technical Article

Recover from a SQL Injection Attack on SQL Server

Lately it seems like SQL Injection attacks have been increasing. Recently our team has worked through resolving a few different SQL Injection attacks across a variety of web sites. Each of these attacks had a number of similarities which proved to point back to the same source. With this information in hand, the resolution should be much quicker. As such, if your web site is attacked with SQL Injection, how should you address it? How can the identification, analysis, recovery and resolution be streamlined? What are some lessons learned?

You rated this post out of 5. Change rating

2008-08-22

4,820 reads

Blogs

T-SQL Tuesday #196 – Two risky career decisions I made

By

The T-SQL Tuesday topic this month comes James Serra. What career risks have you...

T-SQL Tuesday #192: What career risks have you taken?

By

This T-SQL Tuesday is hosted by the one and only James Serra – literally...

T-SQL Tuesday #196: Taking Risks

By

This month we have a new host, James Serra. I’ve been trying to find...

Read the latest Blogs

Forums

OPENQUERY Flexibility

By Steve Jones - SSC Editor

Comments posted to this topic are about the item OPENQUERY Flexibility

A Full Shutdown

By Steve Jones - SSC Editor

Comments posted to this topic are about the item A Full Shutdown

Going Native with Fabric Spark Pools: The Fabric Modern Data Platform

By John Miner

Comments posted to this topic are about the item Going Native with Fabric Spark...

Visit the forum

Question of the Day

OPENQUERY Flexibility

Which of these are valid OPENQUERY() uses?

See possible answers