2003-10-03
2,094 reads
2003-10-03
2,094 reads
2003-09-24
2,218 reads
2003-09-19
1,754 reads
2003-09-11
1,758 reads
2003-08-28
1,985 reads
Application roles often interesting possibilities in theory. In practice? Brian explores how they work and some of the pros/cons you should consider before selecting them for use in your applications.
2008-07-25 (first published: 2003-08-27)
45,502 reads
2003-08-26
1,805 reads
Brian writes regularly for us on sql security issues, this week he discusses the pros and cons of various authentication methods.
2003-08-14
18,206 reads
Regular columnist Brian Kelley reviews the real world impact that inadequate security can have by reviewing some recent incidents in the sql/security world. Very much worth reading, especially if you have credit card data.
2003-07-31
7,556 reads
2003-07-23
2,783 reads
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Comments posted to this topic are about the item We Are Eating Our Own...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers