Row Oriented Security Using Triggers
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,510 reads
Handling security in an application can be a bit cumbersome. R Glen Cooper brings us a database design technique from the real world that can help you.
2010-04-23 (first published: 2010-04-06)
6,510 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,230 reads
When moving data in related tables between databases, the order sometimes matters. New author Glen Cooper brings us an article that discusses the issues in maintaining referential integrity.
2009-03-20
6,261 reads
By Vinay Thakur
As this is an Artificial Intelligence (AI) World, things are changing. We can see that...
In a containerized app, React and Chakra UI provide a robust and accessible user...
By Steve Jones
nachlophobia – n. the fear that your deepest connections with people are ultimately pretty...
hi, I have a table called Rules Create table Rules ( Id int ,...
I am currently upgrading a very old database running SQL Server 2008 to SQL...
Hi Team, I am planning to apply security updates for SQL Server 2016 on...
What is returned from this query?
SELECT ( SELECT COUNT (*) FROM Sales.SalesOrderHeader AS soh WHERE soh.OrderDate >= '01/01/2011' AND soh.OrderDate < '01/01/2012') AS OrdersIn2011 , ( SELECT COUNT (*) FROM Sales.SalesOrderHeader AS soh WHERE soh.OrderDate >= '01/01/2012' AND soh.OrderDate < '01/01/2013') AS OrdersIn2012 , ( SELECT COUNT (*) FROM Sales.SalesOrderHeader AS soh WHERE soh.OrderDate >= '01/01/2013' AND soh.OrderDate < '01/01/2014') AS OrdersIn2013;See possible answers