Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,530 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,530 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,242 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,299 reads
By Vinay Thakur
Quick Summary for Microsoft SQL Server till 2025, I am fortunate to be part...
By James Serra
Why this comparison feels confusing If you’re a Power BI report author who’s just...
By Steve Jones
I’m not sure I knew identity column values could not be updated. I ran...
I have mentioned this several times over several years. Can someone please help me...
SELECT COUNT(DISTINCT Component) AS Found FROM tblComponents WHERE(Component NOT LIKE '%[a-z]%') AND(LTRIM(RTRIM(Component)) = 'GM13622')...
Comments posted to this topic are about the item Remotely Engineer Fabric Lakehouse objects:...
In a SQL Server 2025 table, called Beer, I have this data:
BeerIDBeerName 1Becks 2Fat Tire 3Mac n Jacks 4Alaskan Amber 8KirinI run this code:
SELECT JSON_OBJECTAGG(
BeerID: BeerName )
FROM beer;
What are the results? See possible answers