Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,506 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,506 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,227 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,241 reads
By Steve Jones
ioia – n.the wish that you could see statistics overlaid on every person you...
By Steve Jones
I love Chicago. I went to visit three times in 2023: a Redgate event,...
By Brian Kelley
I have found that non-functional requirements (NFRs) can be hard to define for a...
First off, my apologies for what could potentially be a bad title! I am...
I've inherited a couple of rather large databases from my ex-colleague when I join...
Comments posted to this topic are about the item Identifying Customer Buying Pattern in...
I have marked a few transactions in my code. How can I find out which marks were stored in a transaction log?
See possible answers