Editorials

Agile Webcast and Data Management


Next Free Webcast:
SQL Service Broker Advanced Performance Tips and Tricks

We will be looking at some of the advanced features of SQL Service Broker as well as some of the advanced techniques which can be used to maximize the performance of the SQL Service Broker.

> Register Now
> Live date: 11/3/2010 at 12:00 Pacific

Featured Article(s)
Tips for using SQL Server 2008 Snapshot Replication
In this article, you can find some helpful tips to performance tune and optimize SQL Server 2008 snapshot replication.

Webcast Today: Agile Webcast and Data Management
The Webcast by our Agile database expert, Ted Malone, is at 12:00 Pacific today. So if you haven’t registered yet, you still have time. This will be a great opportunity to see how Agile techniques can be applied to database software development. Although there are not as many integrated tools for doing Agile database development, the practices are still applicable, and provide huge benefit and cost savings for any BI project. A large percentage of BI projects fail for a number of reasons. Applying Agile techniques to a BI project greatly reduces the probability of failure. This is primarily due to the fact that a BI project is ever changing. Agile embraces change in a way no other software development methodology can match.

Who should attend? Anyone who works with database development or is considering a BI project.

> Register Now
> Live today at 12:00 Pacific

Data Management Experiences
Yesterday we considered some of the issues with Self Serve Data Mining. I presented some of the issues that are increased by allowing users greater access to your data store. The primary issue was how to restrict data so that it is only available for mining by appropriate individuals.

Tom shares some of his experience solving this problem:

I think it was Inspector Gadget whose messages self-destructed after a few seconds. Maybe there is some potential for that technology in self-service BI 😉

I like how you mentioned integrating data access with active directory. I guess with some web-based applications that serve customers outside of the organization this would not be possible. However, with other apps, I think this is huge. Data access is controlled through stored procedures which check user names against a pre-defined set of row-level access criteria. I’ve used this approach for a small app I built for workload-based budget formulation. Users could only access workloads (i.e. specific rows) belonging to organizational components to which they had access. I then had some simple tables where users could be given access to specific components. All workloads then related to these components.

Do you have other techniques you use? Do you have a way for integrating Active Directory into your Web Applications where users don’t necessarily have an AD Account? Any other insights for protecting your valuable data resources? Share them with us all by sending your comments to btaylor@sswug.org.

Cheers,
Ben