Viewing 15 posts - 766 through 780 (of 6,022 total)
First we must understand what is the external function of a "primary" key (versus an alternate key or candidate key). Once you understand a primary key's external role in relation...
October 2, 2018 at 7:33 am
When we speak of T-SQL "heresies", it seems we're speaking of anti-patterns. Some things developers do (like inline sub-queries, scalar functions, and SELECT *) greatly simplify the code and may...
September 25, 2018 at 8:51 am
On-prem virtualization and cloud hosting makes it easy to spin up new instances, but on the downside it can also lead to a sprawling ghetto of quickly prototyped databases that...
September 21, 2018 at 1:05 pm
The primary database I work with could be best described as an operational data store; containing time versioned copies of tables from multiple OLTP data sources. There are high volume...
September 21, 2018 at 9:54 am
September 21, 2018 at 8:23 am
Regardless of what formal process you follow and which tools you use for the delivery mechanism, many of us have known for years that it's best to perform iterative deployments.
September 20, 2018 at 11:44 am
Views are also a good way to abstract the application from the underlying data model: hiding columns the application doesn't need, computed columns, row filtering, or switching in a new...
September 19, 2018 at 9:35 am
Not to be confused with a "BlackOps" deployment, which is when (hypothetically speaking) a feature currently in prototype or beta is deployed to production temporarily, perhaps under a special schema...
September 17, 2018 at 1:08 pm
We have a PowerShell script that installs SQL Server using all of our internal best practices.
It will download and run the mssql setup executable for appropriate version and...
September 14, 2018 at 7:10 am
September 13, 2018 at 1:06 pm
"You cannot escape it no matter where you run, for wherever you go you are burdened with yourself. Wherever you go, there you are." —Thomas a Kempis
September 13, 2018 at 11:21 am
I don't know why SQL injection is presented as a fundamental flaw of relational databases. Code injection is a much broader security issue that can target all tiers of an...
September 13, 2018 at 8:58 am
If you get there, that would be an interesting case...
September 12, 2018 at 7:20 am
Here is an example of a good introduction to data warehousing by, Jack Zheng, a Kennesaw State University professor. Within only a few slides, he not only provides an overview...
September 11, 2018 at 2:12 pm
Viewing 15 posts - 766 through 780 (of 6,022 total)