Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,524 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,524 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,240 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,291 reads
By Brian Kelley
If you're looking for particular "Black Friday" deals, here is what I've seen advertised...
By SQLPals
Dry-run xp_delete_file Before Actually Deleting Files? xp_delete_file doesn’t really have a...
By Brian Kelley
In the United States, today is Thanksgiving. The intent behind the holiday is to...
Comments posted to this topic are about the item FinOps - the new name...
Comments posted to this topic are about the item Which Object Definitions Are Available?
Comments posted to this topic are about the item What's Your Theme Music?
For which of these object types can I get the code when I run the OBJECT_DEFINITION() function in SQL Server 2025? (choose 3)
See possible answers