Featured Article(s) Changing from Non-IDENTITY to IDENTITY and vice versa Changing a column data type from Non-IDENTITY to IDENTITY and vice versa. One 3D Picture Will Tell It All With Sql Power Tools pinpoint performance issues in the entire SQL Server farm in one 3D visualization from any web browser. When poor end-user response time, high CPU usage, blocking, excessive […]
Author: Ben Taylor
Web Application and Desktop Access Controls with SQL Server
Beyond a Normal Report Have you ever beat your head against the wall trying to get yet another report built for users – or, if you’re using a report, trying to get just a little more information out of that report? Use the right tools to build the reports in the first place and you can empower your users to […]
Web Application and Desktop Access Controls with SQL Server
Beyond a Normal Report Have you ever beat your head against the wall trying to get yet another report built for users – or, if you’re using a report, trying to get just a little more information out of that report? Use the right tools to build the reports in the first place and you can empower your users to […]
SQL Server Security – Reality Check
Featured Article(s) Tips for using SQL Server 2005 backup/restore (Part 1) Here are some helpful tips to perform backup and restore actions in SQL Server 2005. Building Presentations Based On SQL Server Data? Stop doing things the old fashioned way – copy, paste, select chart types, format, adjust that font size, change that color… You can have a fantastic presentation […]
SQL Server Security – Reality Check
Featured Article(s) Tips for using SQL Server 2005 backup/restore (Part 1) Here are some helpful tips to perform backup and restore actions in SQL Server 2005. Building Presentations Based On SQL Server Data? Stop doing things the old fashioned way – copy, paste, select chart types, format, adjust that font size, change that color… You can have a fantastic presentation […]
SQL Server Security Tips and Tricks
SQL Server Security Tips and Tricks Several readers wrote in with their ideas and approaches to security, working with what amounts to mixed security environments and the like. I thought I’d pass along some of them here – feel free to send in your thoughts and approaches as well. Roger: "We run multiple web applications against SQL Server sometimes with […]
SQL Server Security Tips and Tricks
SQL Server Security Tips and Tricks Several readers wrote in with their ideas and approaches to security, working with what amounts to mixed security environments and the like. I thought I’d pass along some of them here – feel free to send in your thoughts and approaches as well. Roger: "We run multiple web applications against SQL Server sometimes with […]
Handling Security With SQL Server
Featured Article(s) Create an ADO function by stored procedure name In this article I would like to present and describe the SQL script which produces front-end ADO called a function by a stored procedure name. For both VB.NET and C#. Handling Security With SQL Server How do you approach security for SQL Server? It’s a tad easier question if you […]
Handling Security With SQL Server
Featured Article(s) Create an ADO function by stored procedure name In this article I would like to present and describe the SQL script which produces front-end ADO called a function by a stored procedure name. For both VB.NET and C#. Handling Security With SQL Server How do you approach security for SQL Server? It’s a tad easier question if you […]
3 Days, 11 Speakers, 33 Sessions, More than 75,000 Video Streams…
Featured Article(s) Working with Windows Services in Microsoft .NET Windows Services are programs that are executed in the background, have no user interface and are long running executable applications. They can be configured to start automatically or even they can be started manually. These applications are actually controlled by the Service Control Manager. This article will teach you how to […]