SQL Server security – Providing a security model using user-defined roles. This article will discuss how to use user-defined server and database roles to provide secure access to SQL Server resources. What is Role-Based Security?
Heaps in SQL Server. When inserting rows into a heap, SQL Server must sometimes update the PFS page which can PFS contention and affect performance. In this article, Uwe Ricken demonstrates how to measure PFS contention.
Using MySQL with Unity. SQL is the language of data management, and Unity is a game engine. In this article, Lance Talbert explains how to save data using MySQL with Unity.
There are two different methods to authenticate to SQL Server: Windows and SQL Server. Windows is the more secure for connecting to SQL Server. Each connection that authentications to SQL Server gains access to the instance via a login. Logins are defined at the server level.
In this article, you’ll be driven through the Suave server by developing a complete CRUD REST API.
You can use Unity’s Remote Config utility to update settings for users. Lance Talbert walks you through using the utility including a JSON example.
Many devs and IT professionals looking for the next career wonder how to become a data scientist. Ashwin Thota matches up skills to job titles.
Google Firebase is a PaaS offering for developing web and mobile apps. Amit Jambusaria explains the advantages and walks through a sample app.
T-SQL is my favorite aspect of working with SQL Server. The release of SQL Server 2005 coincided with the beginning of my involvement with the community as a presenter and author. I’ll talk about what to watch out for and how to turn off the features at the database or query level when they don’t make sense.
Moving resources from one location to another in Azure has been possible but not easy to do. In this article, Dennes Torres introduces an exiting new Azure feature: Azure Resource Mover.
In this article, I would like to show you a technique that can be used to reveal information that a user is not supposed to see and how to protect it. The technique is very simple, and it relies on SQL Server error messages to reveal information that could be stolen by adversaries.
You can use Xamarin to develop .NET apps to run on iOS or Android instead of Windows. In this article, Julio Sampaio demonstrates the Uno Platform. You can build cross-platform applications using Uno which has even more options.
Azure Data Factory is a cloud based data orchestration tool that many ETL developers began using instead of SSIS. In this article, Rodney Landrum recalls a Data Factory project where he had to depend on another service, Azure Logic Apps, to fill in for some lacking functionality.
Like any technology, AI can be used for evil instead of good. Shree Das explains several examples and what should be done to prevent the misuse of data.
An augmented reality application can interact with objects in the real world. In this article, Lance Talbert demonstrates how to create an AR app with Unity.
Getting that first job as a DBA is not easy for most of us. In this article, Pamela Mooney explains what to expect when interviewing and how to prepare.
Uwe Ricken continues his series on heaps. This time he demonstrates a common scenario where the query against a heap is faster than a clustered index.
The FOMO has been eliminated. There is no longer a “fear of missing out”. For the first time in memory, that type of FEAR is gone. There are no events, no places to be, nowhere to go…everyone is in the same boat. Our worlds are simple. We are where we are.
In the second article of this series, Uwe Ricken discusses ways to affect the performance of queries involving heaps, including the TOP operator, compression, and partitioning. In this article, I describe how a Heap works when data are selected.