|
|
|
|
|
|
SQL Server 2012 : SQL Server Security Overview |
If you are already familiar with the concepts of users and roles and SQL Server logins. But for those who aren’t, we’ll provide a quick explanation. The concepts of users and roles exist both in the Microsoft Windows world and in SQL Server. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SQL Server 2012 : What Is a Transaction? |
A transaction is a single operation or set of operations that succeed or fail together as a whole, thereby ensuring consistency of data should unforeseen circumstances arise. |
|
|
|
MySQL : The Binary Log - The mysqlbinlog Utility (part 1) - Basic Usage |
One of the more useful tools available to an administrator is the client program mysqlbinlog. This is a small program that can investigate the contents of binlog files as well as relay logfiles . In addition to reading binlog files locally, mysqlbinlog can also fetch binlog files remotely from other servers. |
|
|
SQL Server 2012 : Exploring SQL CLR - Security |
When you deploy an assembly from Visual Studio, its security level is set to Safe by default. To change it, double-click the Properties node in the Solution Explorer, click the SQLCLR tab in the resulting property sheet designer and then select SAFE, EXTERNAL_ACCESS, or UNSAFE from the Permission Level combo box. |
|
|
SQL Server 2012 : Exploring SQL CLR - CLR Aggregates |
T-SQL has a number of built-in aggregates, such as SUM, AVG, and MAX, but that set of built-in functions is not always sufficient. Luckily, the SQL CLR features in SQL Server 2012 allow us to implement user-defined aggregates in .NET code and use them from T-SQL. User-defined aggregates can be implemented only in SQL CLR code; they have no T-SQL equivalent. |
|
SQL Server 2012 : Exploring SQL CLR - CLR Triggers |
T-SQL triggers are really just stored procedures that are called by SQL Server at specific times and that can query values in the DELETED and INSERTEDSQL CLR triggers are similar to SQL CLR stored procedures, and they can be created for all data manipulation language (DML) actions that modify data. pseudo-tables . |
|
|
|
|
|
|
|
My SQL : Replication for High Availability - Procedures (part 2) - Hot Standby |
The easiest of the topologies for duplicating servers is the hot standby topology. This topology is shown in Figure 2 and consists of the master and a dedicated server called a hot standby that duplicates the main master. The hot standby server is connected to the master as a slave, and it reads and applies all changes. |
|
|
My SQL : Replication for High Availability - Redundancy, Planning |
To understand where redundancy might be needed, you have to identify every potential point of failure in the deployment. Even though it sounds easy—not to mention a tad tedious and boring—it requires some imagination to ensure that you really have found them all. |
|