Viewing 3 posts - 1 through 3 (of 3 total)
Let's detail a little bit:
- It's completely inefficient to hit the SQL server with "Select * from table1" with a user that don't have the right to browse "table1" and...
May 4, 2011 at 6:03 am
Well let's start first with a "why".
Usually the DB is last in the chain of layers (or first, depending on the perspective :D).
It's a common implementation for Authentification/Authorization to affect...
May 4, 2011 at 4:10 am
Well I disagree your point of view.
You didn't define the scope of the applications, the dimensions of the tables and the no. of transactions per second.
I'm in a position where...
July 22, 2005 at 5:07 am
Viewing 3 posts - 1 through 3 (of 3 total)