Author: Ben Taylor

Editorials

USB, Your Data, SQL Server and Security

Featured Article(s) Changing from Non-IDENTITY to IDENTITY and vice versa Changing a column data type from Non-IDENTITY to IDENTITY and vice versa. One 3D Picture Will Tell It All With Sql Power Tools pinpoint performance issues in the entire SQL Server farm in one 3D visualization from any web browser. When poor end-user response time, high CPU usage, blocking, excessive […]

Uncategorized

SQL Server Security – Reality Check

Featured Article(s) Tips for using SQL Server 2005 backup/restore (Part 1) Here are some helpful tips to perform backup and restore actions in SQL Server 2005. Building Presentations Based On SQL Server Data? Stop doing things the old fashioned way – copy, paste, select chart types, format, adjust that font size, change that color… You can have a fantastic presentation […]

Editorials

SQL Server Security – Reality Check

Featured Article(s) Tips for using SQL Server 2005 backup/restore (Part 1) Here are some helpful tips to perform backup and restore actions in SQL Server 2005. Building Presentations Based On SQL Server Data? Stop doing things the old fashioned way – copy, paste, select chart types, format, adjust that font size, change that color… You can have a fantastic presentation […]

Uncategorized

SQL Server Security Tips and Tricks

SQL Server Security Tips and Tricks Several readers wrote in with their ideas and approaches to security, working with what amounts to mixed security environments and the like. I thought I’d pass along some of them here – feel free to send in your thoughts and approaches as well. Roger: "We run multiple web applications against SQL Server sometimes with […]

Editorials

SQL Server Security Tips and Tricks

SQL Server Security Tips and Tricks Several readers wrote in with their ideas and approaches to security, working with what amounts to mixed security environments and the like. I thought I’d pass along some of them here – feel free to send in your thoughts and approaches as well. Roger: "We run multiple web applications against SQL Server sometimes with […]

Uncategorized

Handling Security With SQL Server

Featured Article(s) Create an ADO function by stored procedure name In this article I would like to present and describe the SQL script which produces front-end ADO called a function by a stored procedure name. For both VB.NET and C#. Handling Security With SQL Server How do you approach security for SQL Server? It’s a tad easier question if you […]

Editorials

Handling Security With SQL Server

Featured Article(s) Create an ADO function by stored procedure name In this article I would like to present and describe the SQL script which produces front-end ADO called a function by a stored procedure name. For both VB.NET and C#. Handling Security With SQL Server How do you approach security for SQL Server? It’s a tad easier question if you […]

Uncategorized

3 Days, 11 Speakers, 33 Sessions, More than 75,000 Video Streams…

Featured Article(s) Working with Windows Services in Microsoft .NET Windows Services are programs that are executed in the background, have no user interface and are long running executable applications. They can be configured to start automatically or even they can be started manually. These applications are actually controlled by the Service Control Manager. This article will teach you how to […]