Data Otaku
A seemingly random collection of data- and database-related posts
Sidebar: The MS IT Pattern for Custom Writeback Applications
NOTE This is part of a series of entries on the topic of Building a Writeback Application with...
Author: Bryan C Smith Date: 06/05/2012
Building a Custom Writeback Application
NOTE This is part of a series of entries on the topic of Building Writeback Applications with...
Author: Bryan C Smith Date: 06/04/2012
Building a Write-Enabled Cube
NOTE This is part of a series of entries on the topic of Building Writeback Applications with...
Author: Bryan C Smith Date: 06/03/2012
A Technical Review of the Simple Demonstration
NOTE This is part of a series of entries on the topic of Building a Writeback Application with...
Author: Bryan C Smith Date: 06/03/2012
Sidebar: The Other What-If Analysis Options in Excel
NOTE This is part of a series of entries on the topic of Building a Writeback Application with...
Author: Bryan C Smith Date: 06/03/2012
A Simple Demonstration of What-If Analysis
NOTE This is the second of a series of entries on the topic of Building a Writeback Application with...
Author: Bryan C Smith Date: 06/03/2012
Understanding What-If Analysis
NOTE This is the first of a series of entries on the topic of Building Writeback Applications with...
Author: Bryan C Smith Date: 06/03/2012
Building a Writeback Application with Analysis Services
Recently, I delivered a presentation at the 2012 PASS SQL Rally titled Building a Writeback...
Author: Bryan C Smith Date: 06/03/2012
An Introduction to Big Data Concepts
The idea that data collected in computerized systems could be used to inform and thereby improve...
Author: Bryan C Smith Date: 11/01/2011
An Introduction to BigData Concepts: My Disclaimer
Recently, Microsoft announced its plans around Hadoop and all of a sudden BigData is part of the...
Author: Bryan C Smith Date: 10/29/2011
Creating Your First FileTable in SQL Server Denali CTP3
With SQL Server Denali CTP3 now available, I'm starting to explore some of the new Database Engine...
Author: Bryan C Smith Date: 09/20/2011
Virtualizing the SharePoint 2010 Database-Tier
Over the last few months, I’ve had a number of conversations with customers regarding the...
Author: Bryan C Smith Date: 07/11/2011
Securing the Data Warehouse
After completing a series of posts on Building Secure Database Applications, the question of how the...
Author: Bryan C Smith Date: 06/28/2011
Regulate Network Connectivity
SQL Server accepts client connections over specific network protocols and (for lack of a better...
Author: Bryan C Smith Date: 06/27/2011
Monitor & Enforce Security Policies
Once a security policy is defined, it then needs to be monitored and enforced to ensure compliance....
Author: Bryan C Smith Date: 06/27/2011
SQL Injection Demo
The purpose of this post is to demonstrate a simple SQL injection attack. For information on...
Author: Bryan C Smith Date: 06/26/2011
Defend against SQL Injection
SQL injection is an attack by which user input is used to modify the logic of a SQL statement. The...
Author: Bryan C Smith Date: 06/26/2011
Transparent Data Encryption (TDE) Demo
This post demonstrates the use of Transparent Data Encryption (TDE) to protect database files...
Author: Bryan C Smith Date: 06/25/2011
Digital Signing Demo
This post demonstrates the use of a digital signing function to ensure data within a table is...
Author: Bryan C Smith Date: 06/25/2011
Cryptographic Function Demo
This post demonstrates the use of a cryptographic function encrypt data within a table. To...
Author: Bryan C Smith Date: 06/25/2011
Encrypt the Data
SQL Server supports the encryption of data through a number of mechanisms. These include:...
Author: Bryan C Smith Date: 06/25/2011
Module Signing Demo
This post demonstrates the use of module signing to provide controlled access to objects to which a...
Author: Bryan C Smith Date: 06/24/2011
Context Switching Demo
This post demonstrates the use of context switching to provide controlled access to objects to which...
Author: Bryan C Smith Date: 06/24/2011
Ownership Chain Demo
This post demonstrates the use of ownership chains to provide controlled access to objects to which...
Author: Bryan C Smith Date: 06/24/2011
Application-Specific Endpoint Demo
This post demonstrates the use of endpoints to secure application connectivity to an instance of SQL...
Author: Bryan C Smith Date: 06/23/2011
Secure the Authentication Process
SQL Server supports two authentication mechanisms: Windows authentication and SQL Server (SQL)...
Author: Bryan C Smith Date: 06/22/2011
Harden the Database Server
Reducing the database server’s exposure to attacks (hardening) is a pretty big task. The...
Author: Bryan C Smith Date: 06/21/2011
Build Secure Database Applications with Microsoft SQL Server
The recent spate of breaches and attacks targeting various business and government computing systems...
Author: Bryan C Smith Date: 06/21/2011