Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,534 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,534 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,243 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,303 reads
When starting with AWS RDS Aurora for managing relational databases in the cloud, many...
By gbargsley
This is Week 1 of PowerShell Strikes Back – a four-week May series for...
By Steve Jones
This happened to me recently after being busy with non-data modeling tasks for a...
Kantor Cabang BCA Mall Kelapa Gading HUB.Tlpn.0851•8812•0691 Mall Kelapa Gading 3, Jl. Sanur Raya...
PPCR+MQ6, WHATSAPP 087781685658 Jl. Raya Darmo No.5, Keputran, Kec. Tegalsari, Surabaya, Jawa Timur 60265
BCA KCP Arundina Cibubur HUB.Tlpn.0851•8812•0691 Blk BA, Jl. Cibubur Indah Jl. Lap. Tembak No.26...
In honor of May the fourth and Star Wars (may the force be with you), finish this quote:
"Do, or do not. ..."See possible answers