One of the coolest things I have found for automating code generation is the use of the INFORMATION_SCHEMA views found in many data engines. They can be extremely useful when you have to write repetitive code based on your database schema. For instance, using Entity Framework, you can generate your tables using database first or code first techniques. Frankly, it […]
Tag: Editorials
Create Code with Scripts
One of the coolest things I have found for automating code generation is the use of the INFORMATION_SCHEMA views found in many data engines. They can be extremely useful when you have to write repetitive code based on your database schema. For instance, using Entity Framework, you can generate your tables using database first or code first techniques. Frankly, it […]
SQL Server Standard Databases
Every once in a while I like to review the different system tables for those new to SQL Server. With the rise of code first in Entity Framework, more developers are getting involved with SQL Server databases without some of the basic understanding of tools available to them. First you have the Master database. The master database is the catalog […]
SQL Server Standard Databases
Every once in a while I like to review the different system tables for those new to SQL Server. With the rise of code first in Entity Framework, more developers are getting involved with SQL Server databases without some of the basic understanding of tools available to them. First you have the Master database. The master database is the catalog […]
First Line Defense Against SQL Injection
SQL Injection has a number of different techniques, some of which are available based on the way you have configured your SQL Server engine, database security, and database access by your application. Let’s start with the SQL Service. The best way to thwart SQL Injection is to limit the permissions of the SQL Server service. This is done by creating […]
Database Access Security
I’d like to wrap up this week editorials with some observations on database security. We’ve been talking about application role level security, and application to REST services security. Including database security covers the three basic layers of an Internal WAN based application. Opening your application to the world wide web is another matter altogether. In the old days of two […]
Another Hole in the Armor
I was talking with a couple developers a while ago about security. They had developed a really nice security framework allowing users to be granted role based access to their application. Based on the user’s role(s), Buttons and Controls would appear or be hidden, restricting the user experience to the permissions they had been granted through their roles. The whole […]
What? More than one Data Store?
While talking about ACID transactions, we have been looking at different approaches to persist data, using Relational, Sharded, and NoSQL/Distributed data stores. They all have one thing in common: They save and retrieve data. As we compare the different technologies, we tend to think of them as mutually exclusive. Are they really mutually exclusive? Is there a potential flaw in […]
Do You Have to Have ACID?
Eventual Consistency does not violate Consistency in ACID. Why is this a big thing? Because most NoSql engines do not block access to a data record until it has been propagated to all replicate data stores. The majority of NoSql databases have been designed to handle performance of high demand OLTP or OLAP systems with heavy Insert/Update traffic. In order […]
Amazon DynamoDB Does ACID
One of our readers recently sent me a link to GitHub, demonstrating how you can achieve ACID capabilities in the Amazon DynammoDB. Amazon DynamoDB is a distributed database engine running in the Amazon services. It released with the capabilities of supporting Consistency and Durability, without focusing on Atomicity and Isolation. Lookup ACID on Wiki if you are not familiar with […]