Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,520 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,520 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,238 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,286 reads
By Brian Kelley
I thought it would be good to put my thoughts down on how to...
You want the short answer? Well, the only antidote to knowledge stagnation is probably...
By Chris Yates
It always starts the same way. You open your laptop on a Monday morning,...
At the Fare facility, a NABL-approved environment pollution testing facility in India, our highly...
Comments posted to this topic are about the item Guidelines and Requirements
Comments posted to this topic are about the item Copying Production Schema
If I use DBCC CLONEDATABASE, can I remove some of the information from the copy?
See possible answers