Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
I have a table called Stores that contains information about the grocery stores in the chain I work for. I need to write a stored procedure that accepts a list of store IDs as an argument and returns details about those stores. If I know the li...
Nearly everyone I know (myself included) believes that privacy on the Internet is important. I've noticed, however, that until recently, I unconsciously classified "anonymity" as a kind of privacy and so considered it an automatic right of...
Microsoft announced that it will start synchronizing updates to its Visual Studio .NET development tool with Windows OS and other product releases, beginning with the release of Windows .NET Server (Win.NET Server) later this year. The first...
Microsoft released SQL Server 2000 Notification Services on Monday, continuing to extend SQL Server's reach beyond traditional relational database functionality. When I first wrote about Notification Services 5 months ago, the beta version had...
David Litchfield of NGS Software discovered vulnerabilities in SQL Server and Microsoft Desktop Engine (MSDE) that could result in an unprivileged user gaining control of the database. These vulnerabilities stem from weak default permissions on...
Three weeks ago, I described a SQL Server system-design philosophy that I call "designing for extreme performance." Many of you asked me to clarify my thoughts in a few key areas, and I'm going to start that process this week. I'll continue to...