Viewing 15 posts - 796 through 810 (of 938 total)
Hi,
I haven't done any actual performance comparisons - but I would venture a guess that the main benefit you'd get from performing the encryption on the server would be that...
February 17, 2006 at 8:09 pm
The functionality (and, in this particular case, syntax) are part of the ANSI SQL99 standard.
February 14, 2006 at 9:43 am
Hi Elizabeth,
Per our emails, this issue (memory fragmentation) has been resolved. The newer version (v. 0.9) is available for general download on SQL Server Central. Thanks for bringing this to...
February 10, 2006 at 6:01 pm
There was a "memory fragmentation" issue with the prior version. The memory was being released properly in C++, but SQL Server was not reclaiming it in a timely manner. I've...
February 10, 2006 at 6:00 pm
There was an issue with memory fragmentation for very large data sets (3 million+ rows in testing.) Make sure you have the most recent copy installed (v. 0.9), which...
February 6, 2006 at 2:25 pm
Or, if you wanted to do it the .NET way (as opposed to VB6 style), Fill a DataSet and access the two tables individually. That, or open a SqlDataReader and...
February 3, 2006 at 9:08 am
You hit the nail on the head: "And running a cursor ... specifically when there is no logical way to perform a set operation, is a valid application of an available tool."
Very,...
January 20, 2006 at 6:19 pm
Exactly right. Trusting a TABLE variable (as opposed to a Temp. Table, or any other table for that matter) not to use TEMPDB is a fallacy. There is no specification...
January 17, 2006 at 11:22 am
SQL is set-based. Everything is done in sets. Almost anything (with very, very, very few exceptions) that you can do with CURSORS can be done with set-based SQL commands +...
January 17, 2006 at 11:15 am
Surprisingly enough, when doing mass UPDATES or DELETES on very large tables, I've found that using a WHILE loop to limit the number of rows affected at one time gives a...
January 17, 2006 at 10:59 am
Hi Ed,
The supplied XP's do perform AES 256 bit encryption/decryption. The code used is based directly on the algorithm published by the authors of AES/Rijndael (Joan Daemen and Vincent Rijmen). If you're...
January 12, 2006 at 8:11 am
According to Visual Studio Magazine, http://www.ftponline.com/vsm/2005_08/magazine/features/rjennings/, SQL Express supports the same native encryption tools available in SQL 2K5. I can't confirm that myself since I removed Express from my system and...
December 29, 2005 at 6:31 pm
There are still plenty of software houses that don't care about quality, scalability, etc. I worked for one in the not-distant past. You can attempt to take leadership positions and...
December 16, 2005 at 8:44 am
With SQL 2K5, native data encryption and key management are built right into T-SQL. In addition, you can access the CryptoAPI from within .NET Stored Proc code if you want to...
December 14, 2005 at 7:55 pm
Viewing 15 posts - 796 through 810 (of 938 total)