SQLServerCentral Article

All About Transactions - Part 3

Transactions in SQL Server are probably no more complicated than those in other RDBMS products, which is to say they are fairly complex. Don Peterson continues with part 3 of his series and takes a look at transaction isolation levels and how they interact with multiple connections and their impact on locking.

SQLServerCentral Article

Reduce Database RoundTrips Using XML

SQL Server 2000 added XML support to allow some basiuc manipulation of XML data. At the time, XML was a hot buzzword in the computer industry and there were lots of applications being written to use XML. While the buzz has cooled, Jon Winer still uses XML in some interesting ways to make his life easier and his applications more rebust. Here he brings us a technique he's used to reduce the number of round trips required by an application.

Technical Article

Data Sanitization Techniques

Data Sanitization is the process of making sensitive information in non-production databases safe for wider visibility. This White Paper is an overview of various techniques which can be used to sanitize sensitive production data in test and development databases.

Technical Article

Common Vulnerabilities in Database Security

Creating an enterprise security plan is a complex endeavour. It involves evaluating multiple threats that gain access through many network paths to a hodgepodge of different applications and systems. With the focus on systems and paths, databases are frequently overlooked. Securing the database should be a fundamental tenet for any security practitioner when developing his or her security plan. The database is the source of data, the "crown jewels" in the information economy. Any security effort must start with this in mind and end with the strongest level of controls applied at the database layer.

Blogs

Streamlining Azure VM Moves Into Availability Zones

By

One of the more frustrating aspects about creating an Azure virtual machine is that...

Monday Monitor Tips: Native Replication Monitoring

By

Redgate Monitor has been able to monitor replication for a long term, but it...

Advice I Like: Art

By

Superheroes and saints never make art. Only imperfect beings can make art because art...

Read the latest Blogs

Forums

Think LSNs Are Unique? Think Again - Preventing Data Loss in CDC ETL

By utsav

Comments posted to this topic are about the item Think LSNs Are Unique? Think...

A Big PK

By Steve Jones - SSC Editor

Comments posted to this topic are about the item A Big PK

The AI Bubble and the Weak Foundation Beam

By dbakevlar

Comments posted to this topic are about the item The AI Bubble and the...

Visit the forum

Question of the Day

A Big PK

In SQL Server 2025, how many columns can be included in a Primary  Key constraint?

See possible answers