2003-09-24
2,217 reads
2003-09-24
2,217 reads
2003-09-19
1,753 reads
2003-09-11
1,757 reads
2003-08-28
1,985 reads
Application roles often interesting possibilities in theory. In practice? Brian explores how they work and some of the pros/cons you should consider before selecting them for use in your applications.
2008-07-25 (first published: 2003-08-27)
45,458 reads
2003-08-26
1,803 reads
Brian writes regularly for us on sql security issues, this week he discusses the pros and cons of various authentication methods.
2003-08-14
18,198 reads
Regular columnist Brian Kelley reviews the real world impact that inadequate security can have by reviewing some recent incidents in the sql/security world. Very much worth reading, especially if you have credit card data.
2003-07-31
7,547 reads
2003-07-23
2,782 reads
2003-07-18
2,631 reads
In last months one of the scenarios where you can use AI has been...
By ChrisJenkins
Do you spend so long manipulating your data into something vaguely useful that you...
By Steve Jones
It was neat to stumble on this in the book, a piece by me,...
Comments posted to this topic are about the item Creating JSON II
Comments posted to this topic are about the item Engineer Lessons
On SQL Server 2025, what happens when I run this code:
SELECT JSON_OBJECTAGG( N'City':N'Denver' RETURNING JSON) GOSee possible answers