Additional Articles


External Article

SQL Server 2000 Security - Part 6 - Ownership and Object Permissions

We have described, so far, authorization based on a predefined fixed server (determining a set of SQL server-wide privileges) and database (applying to database objects and activities) roles. We have also discussed application roles, which makes the level of permissions independent of those assigned to a SQL Server login or a database user account. Now it is time to look into permissions from the point of view of database objects. There are two main factors that play a role in determining how access rights to them are evaluated - their ownership and custom permissions. We will discuss the first one of these topics in this article and will continue with the other one in the next installment of this series.

2005-03-22

2,349 reads

Technical Article

Exploring 'ON DELETE SET NULL' in SQL Server 2005

At first glance, the 'ON DELETE SET NULL' option in SQL Server 2005 may not seem like a big deal, but once you've seen how it can be used, I think you will be impressed. The basics? If Order.CustomerID has a foreign key to Customer.CustomerID and a customer is deleted, 'ON DELETE SET NULL' causes the CustomerID field in each of that customer's orders to be set to NULL. It allows the "parent" record to be deleted and sets the "child" record's column to NULL. A normal foreign key says Order.CustomerID must match a record in Customer. An 'ON DELETE SET NULL' foreign key says that if Order.CustomerID is not null, then its value must match a record in Customer.

2005-03-18

1,579 reads

External Article

MDX Essentials: Set and String Functions: The GENERATE() Function

In this lesson, we will introduce a function that provides us the ability to derive a set by systematically applying a set expression to each of the members of a set we define. GENERATE() is a potent function in our MDX toolset, in that it enables us to select precisely only certain members of a dimension level. It effectively operates upon two sets to create a new set, based upon the members of a second set that are also in a primary set.

2005-03-17

1,749 reads

Technical Article

Quick! Which specific SQL Server user is logged into which database?

SQL Server's master database stores tables with important and constantly updated information about the state of the SQL server. One of these tables, sysprocesses, can be used to track (in SQL Server itself) which SQL Server users are currently logged in and which database(s) they are accessing.

The quick way to find out if a particular user is accessing a particular table is with a query.

2005-03-17

2,982 reads

External Article

Full Text Search on SQL 2000 Part 4

This article concentrates on using Full Text Search to query text located inside Microsoft Office documents. In previous articles, Microsoft Search was introduced as an add-on service to enable advanced text queries. Catalogs, the physical storage units for search, were created and indexed. The TSQL keywords CONTAINS, FORMSOF, and INFLECTIONAL were used to query the newly created Catalogs. Population Schedules along with Change Tracking options were discussed as methods to keep the Catalogs up to date with the underlying database.

2005-03-16

2,595 reads

Technical Article

Programming Replication from Heterogeneous Data Sources

Microsoft® SQL Server™ enables third-party products to become Publishers within the SQL Server replication framework. The Replication Distributor Interface allows replication from heterogeneous databases that provide 32-bit OLE DB drivers to Subscribers running SQL Server 2000. Heterogeneous data sources include:

* Oracle databases

* DB2 databases

* Microsoft Access databases

* Other databases that comply with SQL Server ODBC or OLE DB Subscriber requirements

2005-03-16

2,300 reads

Technical Article

SQL Server 2005 Integration Services: Lessons from Project REAL

In Project REAL we are using large volumes of real data and scenarios from real companies to implement business intelligence systems using early releases of Microsoft SQL Server 2005. In the process, best practices are being developed and potential problems uncovered. This article reports some of the lessons learned while working on the data extraction, transformation, and loading (ETL) portion of the first phase of Project REAL.

2005-03-15

1,981 reads

External Article

The value of experienced coders

I was about 40 the first time I was told I should not continue coding. A well-meaning vice president at my company pulled me aside at a party and told me that I was getting too old to code. He had been a coder himself, knew that he was getting too old, and moved over to sales. He was sure that I should be moving over to another part of the business. I told him that perhaps not only did he have a problem coding when he reached 40, he probably had the same problem at 38. I said that I was perfectly happy as a coder, and had every intention of continuing as long as someone was willing to pay me.

2005-03-15

3,434 reads

Technical Article

Automatically Utilizing XML's Untapped Semantic Goldmine

A mind is a terrible thing to waste and so is the vast quantity of untapped data structure meta information available free for the using in any XML document. This semantic data available in XML is like gold lying on the ground ready to be scooped up and cashed in with little or no effort. This is meta information that can be utilized immediately to significantly increase the value of the raw XML data. By automatically utilizing this valuable structure meta information, hierarchical fourth generation languages (4GLs) can nonprocedurally process XML's complex multi-leg hierarchical structure. This significantly increases the usefulness of the data and makes it immediately available for use at its enhanced value. This article describes the semantics of hierarchical data structures and how they can be automatically utilized by 4GLs.

2005-03-14

1,424 reads

Blogs

Scooby Dooing Episode 9: The Case of the Artificially Intelligent Villain

By

Welcome back, my fellow sleuths, to my mystery-inspired blog series! I’m having a ton...

The Book of Redgate: Don’t be an a**hole

By

This was one of the original values: The facing page has this text: No...

Beyond Pipelines: How Fabric Reinvents Data Movement for the Modern Enterprise

By

For decades, enterprises have thought about data like plumbers think about water: you build...

Read the latest Blogs

Forums

Create an HTML Report on the Status of SQL Server Agent Jobs

By Nisarg Upadhyay

Comments posted to this topic are about the item Create an HTML Report on...

Are things getting beyond reason?

By skeleton567

My wife apparently ask her phone a question and below is what she sent...

I Love Editorials

By Grant Fritchey

Comments posted to this topic are about the item I Love Editorials

Visit the forum

Question of the Day

A Common Split

What happens when I run this code:

DECLARE @s VARCHAR(1000) = 'apple, pear, peach'
SELECT *
FROM STRING_SPLIT(@s, ', ')

See possible answers