Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,530 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,530 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,242 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,299 reads
By Vinay Thakur
I wrote about TempDB Internals and understand that Tempdb plays very important role on...
By Vinay Thakur
continuing from Day 1 where we covered the history of AI and GPT family,...
By Steve Jones
It’s a day off for Redgate today. This is our annual wellbeing day, where...
Comments posted to this topic are about the item A Quick Restore
Comments posted to this topic are about the item Guarding Against SQL Injection at...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
While doing some testing of an application, I wanted to reset my environment after doing some testing with this code:
USE DNRTest BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO /* Bunch of stuff tested here */RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens if this runs, assuming the "bunch of stuff" isn't anything affecting the instance. See possible answers