(Jasper Oosterveld) An important aspect of working with documents is security. You don’t want people looking into confidential documents. To work with security in SharePoint you have to know the basics of the SharePoint security model.
Other News
Optimizer: new EXPLAIN FORMAT=JSON
(Gleb Shchepa) Probably, most of us tried to read the output of MySQL EXPLAIN command at least once.
Saving and Reusing Your Custom Queries as Template Using Template Explorer in SQL Server 2008
(Lajapathy Arun) In this article I will show you how to save your custom queries as a template and reuse the queries instead of saving as a file.
Invent your own Dynamic LINQ parser
(Andreas Gieriet) This is an alternative to the original Tip Dynamically generate a LINQ query with a custom property.
Best practices: Physical database design for online transaction processing (OLTP) environments
(Sripriya Srinivasan, Weilin Lu, Amyris Rada, Punit Shah and Vincent Kulandai Samy) Understanding the basic concepts, the stages of physical database design, and the advanced aspects that affect the structure of databases is key for a successful database design.
C# Constructor Newbie Question
$$SWYNK$$ Featured Article(s) How to Backup (Part 1) Since data is the lifeline of your company, you, as a Data Professional, need to ensure that your data is protected, recoverable, usable, secure, and so on. One of the first tasks that you should perform as a Data Professional is to ensure that the data is properly backed up. This seems […]
Centralized Authentication Services
Centralized Authentication Services In response to my editorial from yesterday regarding a centralized authentication framework, David Ellis, a regular contributor to our newsletter provides three authentication frameworks providing standardized trust capabilities. David writes: I’m aware of three major authentication frameworks that are trying to standardize exactly the problem you’re describing (allow trusted sources to provide for authentication). OpenID http://openid.net/ – […]
Learn to Create Interceptors in WCF Services
(V.N.S Arun) Windows Communication Foundation (WCF) is a distributed system technology, which can be customized to any level as far as I have seen. A WCF application can be customized right from the protocols it uses until the size of the message.
Understanding Scope and Packages in Perl
(James Lee) In this fourth part of a six-part article series on subroutines and functions in Perl, you will learn about two different types of variables (global and lexical) and their scopes. You will also learn what a package is.
Getting FetchXML from LINQPad
(keydet) Using FetchXML is necessary in many situations with CRM 2011. Using FetchXML becomes even more necessary if you are taking a “design for online” approach to solution building. I’m a big believer that everyone should approach solution design this way because then your solution will truly b
