Object Oriented Relational Database Design Michal submits a question he’d like answered in our daily editorial. “How to take a database that is the basis for entities and apply common patterns like factory, etc – writing databases for object oriented design?” I think this is an excellent question. The short answer is that you cannot design an object oriented database […]
Editorials
How Much Do You Need to Know About Query Plans?
SelecTViews With Stephen Wynkoop Find out the latest news involving Adobe’s Flash Builder 4.5. What’s going on with Oracle’s lawsuit against Google? How about some tips on cloud appropriateness? Stephen answers, "What is an outer union operation and how does it work?" How Much Do You Need to Know About Query Plans? Like anything to do with software, you need […]
No More Injection
No More Injection Really! It’s time to move on to other topics. So today I want to close out on our discussion of application injection with some final reader’s comments. Next time we will be moving on to another topic of interest. One thing I would encourage you to look into if you haven’t heard the term before is Blind […]
Injection Prevention Tips and Techniques
SelecTViews With Stephen Wynkoop Find out about business intelligence trend surveys, MySQL in the cloud…the latest news and your SQL Server BI tip for the day. [Watch the Show] Injection Prevention Tips and Techniques In the last couple of newsletters I have provided some code examples of how to prevent SQL Injection. The short answer was to use strongly typed […]
How Secure is Secure?
How Secure is Secure? It wasn’t more than a few years ago when Microsoft was the whipping kid when it came to inadequate security measures. Apple, Unix/Linux, Solaris, OS 400, MVS, CMS, etc. were considered more secure because they either didn’t have enough market share, or had less vulnerabilities. Less focus was paid to our own practices in writing code […]
SQL Injection – What to Do?
SQL Injection – What to Do? Lots of good responses regarding what to do in the short term for SQL Injection. Before I list some of the great triage answers today, let me make a simple reminder of how to stop SQL Injection. The easiest answer is simple…use strongly typed parameters whenever you interact with your database. Most data access […]
SQL Injection is Still Around
SQL Injection – It’s Still Around Recently I received an email from a colleague consulting for a company that has exposure for SQL Injection. They use a parameterized stored procedure, and determined that they had resolved their exposure to SQL Injection . SQL Injection occurs when a user embeds SQL Statements in input fields of an application or web form. […]
What Would You Do With Worldwide High Speed Internet
SQL Server Disaster Recovery Expo Today June 17th, 9:00AM Pacific The expo starts this morning at 9:00. If you are registered you can come right into the expo. I hope to see you there! SelecTViews – Find out about business intelligence trend surveys, MySQL in the cloud…the latest news and your SQL Server BI tip for the day. [Watch the […]
Reader Feedback on High/Low
SQL Server Disaster Recovery Expo Tomorrow, June 17th Today is the last day to register for this free expo and gain access to the insights and experiences of Eight renowned experts in SQL Server Disaster Recover. Our speakers include Alan Berry, Sarah Barela, Keven Kline and others. Additional content is available in the optional premium track for those wishing to […]
Surrogate Key Assignment Techniques
SQL Server Disaster Recovery Expo Coming this Friday, June 17th. Only one more day to register for this free Expo and gain access to the insights and experiences of Eight renowned experts in SQL Server Disaster Recovery, including Kevin Kline, Sarah Barela, Alan Berry and others. Additional content is available in a premium track for those wishing to dig even […]