Editorials

Editorials

Object Oriented Relational Database Design

Object Oriented Relational Database Design Michal submits a question he’d like answered in our daily editorial. “How to take a database that is the basis for entities and apply common patterns like factory, etc – writing databases for object oriented design?” I think this is an excellent question. The short answer is that you cannot design an object oriented database […]

Editorials

How Much Do You Need to Know About Query Plans?

SelecTViews With Stephen Wynkoop Find out the latest news involving Adobe’s Flash Builder 4.5. What’s going on with Oracle’s lawsuit against Google? How about some tips on cloud appropriateness? Stephen answers, "What is an outer union operation and how does it work?" How Much Do You Need to Know About Query Plans? Like anything to do with software, you need […]

Editorials

No More Injection

No More Injection Really! It’s time to move on to other topics. So today I want to close out on our discussion of application injection with some final reader’s comments. Next time we will be moving on to another topic of interest. One thing I would encourage you to look into if you haven’t heard the term before is Blind […]

Editorials

Injection Prevention Tips and Techniques

SelecTViews With Stephen Wynkoop Find out about business intelligence trend surveys, MySQL in the cloud…the latest news and your SQL Server BI tip for the day. [Watch the Show] Injection Prevention Tips and Techniques In the last couple of newsletters I have provided some code examples of how to prevent SQL Injection. The short answer was to use strongly typed […]

Editorials

How Secure is Secure?

How Secure is Secure? It wasn’t more than a few years ago when Microsoft was the whipping kid when it came to inadequate security measures. Apple, Unix/Linux, Solaris, OS 400, MVS, CMS, etc. were considered more secure because they either didn’t have enough market share, or had less vulnerabilities. Less focus was paid to our own practices in writing code […]

Editorials

SQL Injection – What to Do?

SQL Injection – What to Do? Lots of good responses regarding what to do in the short term for SQL Injection. Before I list some of the great triage answers today, let me make a simple reminder of how to stop SQL Injection. The easiest answer is simple…use strongly typed parameters whenever you interact with your database. Most data access […]

Editorials

SQL Injection is Still Around

SQL Injection – It’s Still Around Recently I received an email from a colleague consulting for a company that has exposure for SQL Injection. They use a parameterized stored procedure, and determined that they had resolved their exposure to SQL Injection . SQL Injection occurs when a user embeds SQL Statements in input fields of an application or web form. […]

Editorials

Reader Feedback on High/Low

SQL Server Disaster Recovery Expo Tomorrow, June 17th Today is the last day to register for this free expo and gain access to the insights and experiences of Eight renowned experts in SQL Server Disaster Recover. Our speakers include Alan Berry, Sarah Barela, Keven Kline and others. Additional content is available in the optional premium track for those wishing to […]

Editorials

Surrogate Key Assignment Techniques

SQL Server Disaster Recovery Expo Coming this Friday, June 17th. Only one more day to register for this free Expo and gain access to the insights and experiences of Eight renowned experts in SQL Server Disaster Recovery, including Kevin Kline, Sarah Barela, Alan Berry and others. Additional content is available in a premium track for those wishing to dig even […]