In SQL Server 2000 or any relational database, the concept of NULL can be both confusing and hazardess to your employment. Not understanding how to work with NULLs can lead to incorrect responses to queries and poor business decisions being made. New author Michael Coles brings us four rules that can help you work with NULL values in your tables.
2008-03-28 (first published: 2005-06-27)
SQL injection has been a hot topic the last couple years and there are some great articles at SQLServerCentral.com on this topic. Michael Coles brings us an updated look at this SQL Server security issue with some new examples you might not have previously thought.
2008-03-21 (first published: 2005-09-21)
Longtime SQL Server expert Michael Coles brings us the second part of his his introductory look at XML in SQL Server 2005 with a short examination of XQuery, the way in which you can write queries on XML data.
2008-01-31 (first published: 2007-02-20)
Dealing with NULL data is something that often confuses new SQL Server developers, but even experienced DBAs might not understand all the intricacies of NULL operations. In a follow up to his highly acclaimed Four Rules of Null article, Michael Coles brings us a few new
tricks with NULLs.
2008-01-25 (first published: 2007-02-26)
SQL Server 2005 has greatly expanded the capabilities of SQL Server in many different areas. One of those that has matured greatly is the integration of XML data inside SQL Server. Longtime writer and guru Michael Coles brings us the first part of a two part series on XML ion SLQ Server 2005.
2008-01-24 (first published: 2007-02-19)
After introducing us to a comprehensive encryption toolkit in part I, Michael Coles delves into Regular Expressions and the functions included in the toolkit for use on SQL Server 2000.
2007-10-03 (first published: 2006-04-20)
One of the more interesting new features with SQL Server 2005 is the native encryption built into the product. Expert SQL crpytographer, Michael Coles, brings us a look at the symmetric keys in SQL Server 2005 and how they can be used to encrypt data and be secured by a certificate.
2007-08-24 (first published: 2007-05-11)