Transparent Data Encryption in SQL Server 2008
This article describes how the Transparent Data Encryption feature in SQL Server 2008 can be used to secure your databases
This article describes how the Transparent Data Encryption feature in SQL Server 2008 can be used to secure your databases
One of the few things that SQL Server does not automatically help you with is the design of your tales, views, and other database objects. Having standards and design techniques can greatly ease the maintenance of your schema as well as ease the transition to having others work with the database. New author J.D. Gonzalez brings us some of his naming techniques to keep things organized.
Calling all developers! Does the idea of going from a concept to a prototype in a 54 hour marathon weekend of design and coding sound fun to you? If so, join us!
By using cascading referential integrity constraints, you can define the actions that SQL Server 2005 takes when a user tries to delete or update a key to which existing foreign keys point.
This white paper provides an introduction to various features of XQuery implemented in SQL Server 2005 such as the FLWOR statement, operators in XQuery, if-then-else construct, XML constructors, built-in XQuery functions, type casting operators, and examples of how to use each of these features.
Are you in the Zone at work? Can you find those times when you are amazingly productive? Tim Mitchell asks a question in this guest editorial.
By John
One of the more frustrating aspects about creating an Azure virtual machine is that...
By Steve Jones
Redgate Monitor has been able to monitor replication for a long term, but it...
By Steve Jones
Superheroes and saints never make art. Only imperfect beings can make art because art...
Comments posted to this topic are about the item Think LSNs Are Unique? Think...
Comments posted to this topic are about the item The AI Bubble and the...
In SQL Server 2025, how many columns can be included in a Primary Key constraint?
See possible answers