SQL Server Security Best Practices
Learn how to secure your data by implementing SQL Server security best practices.
Learn how to secure your data by implementing SQL Server security best practices.
Or how to query for a particular type of customer. This article examines how you may query for particular rows that match one condition, but may not match another.
This is the funniest error message Brian Knight has ever seen in SQL Server.
Identity columns are last years news. Have you experimented with uniqueindentifiers - better known to programmers as GUID's? Guaranteed to be unique in the world, they offer a powerful alternative to identity columns.
This is a broad overview of the DBCC SQLPERF command primarily for version 7 and 2000.
By default, network database files are not supported with Microsoft SQL Server. Here's a workaround.
This article describes how SQL Server 7.0 (Service Pack 1) OLAP Services takes advantage of the user and group structure in Microsoft Windows NT to offer cell-level security, and describes several ways to tailor permissions to data across the enterprise.
Professional SQL Server 2000 XML - Find out if this book from Wrox is as interesting as it sounds.
This white paper describes how to use the connection pooling objects included with the Microsoft XML for Analysis Provider to develop scalable client and Web applications for Microsoft SQL Server 2000 Analysis Services. (11 printed pages)
By HeyMo0sh
DevOps is about shortening the system development lifecycle. Plan faster, build faster, test faster,...
A short blog post about an issue with Fabric Mirroring (with Azure SQL DB...
By Steve Jones
I wrote an article recently on the JSON_OBJECTAGG function, but neglected to include an...
Comments posted to this topic are about the item PostgreSQL String Functions Part 1
Comments posted to this topic are about the item Working Better Under Pressure
Comments posted to this topic are about the item Identities and Sequences V
When thinking about the identity property and sequence objects, which of these can generate values before an insert statement is executed?
See possible answers