Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,533 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,533 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,242 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,300 reads
By Steve Jones
One of the things a customer asked recently about Redgate Data Modeler was how...
By HeyMo0sh
Cloud environments don’t sit still. Pricing models change, services evolve, workloads grow, and suddenly...
Are you considering replatforming your SQL Server workload due to recent vendor changes, but...
Comments posted to this topic are about the item Removing TDE
Comments posted to this topic are about the item The day-to-day pressures of a...
How do I remove TDE encryption of data from database xxx?
See possible answers