Data Otaku

A seemingly random collection of data- and database-related posts

NOTE This is part of a series of entries on the topic of Building a Writeback Application with...

Author: Bryan C Smith Date: 06/05/2012

Building a Custom Writeback Application

NOTE This is part of a series of entries on the topic of Building Writeback Applications with...

Author: Bryan C Smith Date: 06/04/2012

Building a Write-Enabled Cube

NOTE This is part of a series of entries on the topic of Building Writeback Applications with...

Author: Bryan C Smith Date: 06/03/2012

A Technical Review of the Simple Demonstration

NOTE This is part of a series of entries on the topic of Building a Writeback Application with...

Author: Bryan C Smith Date: 06/03/2012

NOTE This is part of a series of entries on the topic of Building a Writeback Application with...

Author: Bryan C Smith Date: 06/03/2012

A Simple Demonstration of What-If Analysis

NOTE This is the second of a series of entries on the topic of Building a Writeback Application with...

Author: Bryan C Smith Date: 06/03/2012

Understanding What-If Analysis

NOTE This is the first of a series of entries on the topic of Building Writeback Applications with...

Author: Bryan C Smith Date: 06/03/2012

Building a Writeback Application with Analysis Services

Recently, I delivered a presentation at the 2012 PASS SQL Rally titled Building a Writeback...

Author: Bryan C Smith Date: 06/03/2012

An Introduction to Big Data Concepts

The idea that data collected in computerized systems could be used to inform and thereby improve...

Author: Bryan C Smith Date: 11/01/2011

An Introduction to BigData Concepts: My Disclaimer

Recently, Microsoft announced its plans around Hadoop and all of a sudden BigData is part of the...

Author: Bryan C Smith Date: 10/29/2011

Creating Your First FileTable in SQL Server Denali CTP3

With SQL Server Denali CTP3 now available, I'm starting to explore some of the new Database Engine...

Author: Bryan C Smith Date: 09/20/2011

Virtualizing the SharePoint 2010 Database-Tier

Over the last few months, I’ve had a number of conversations with customers regarding the...

Author: Bryan C Smith Date: 07/11/2011

Securing the Data Warehouse

After completing a series of posts on Building Secure Database Applications, the question of how the...

Author: Bryan C Smith Date: 06/28/2011

Regulate Network Connectivity

SQL Server accepts client connections over specific network protocols and (for lack of a better...

Author: Bryan C Smith Date: 06/27/2011

Monitor & Enforce Security Policies

Once a security policy is defined, it then needs to be monitored and enforced to ensure compliance....

Author: Bryan C Smith Date: 06/27/2011

SQL Injection Demo

The purpose of this post is to demonstrate a simple SQL injection attack. For information on...

Author: Bryan C Smith Date: 06/26/2011

Defend against SQL Injection

SQL injection is an attack by which user input is used to modify the logic of a SQL statement. The...

Author: Bryan C Smith Date: 06/26/2011

Transparent Data Encryption (TDE) Demo

This post demonstrates the use of Transparent Data Encryption (TDE) to protect database files...

Author: Bryan C Smith Date: 06/25/2011

Digital Signing Demo

This post demonstrates the use of a digital signing function to ensure data within a table is...

Author: Bryan C Smith Date: 06/25/2011

Cryptographic Function Demo

This post demonstrates the use of a cryptographic function encrypt data within a table. To...

Author: Bryan C Smith Date: 06/25/2011

Encrypt the Data

SQL Server supports the encryption of data through a number of mechanisms. These include:...

Author: Bryan C Smith Date: 06/25/2011

Module Signing Demo

This post demonstrates the use of module signing to provide controlled access to objects to which a...

Author: Bryan C Smith Date: 06/24/2011

Context Switching Demo

This post demonstrates the use of context switching to provide controlled access to objects to which...

Author: Bryan C Smith Date: 06/24/2011

Ownership Chain Demo

This post demonstrates the use of ownership chains to provide controlled access to objects to which...

Author: Bryan C Smith Date: 06/24/2011

Application-Specific Endpoint Demo

This post demonstrates the use of endpoints to secure application connectivity to an instance of SQL...

Author: Bryan C Smith Date: 06/23/2011

Secure the Authentication Process

SQL Server supports two authentication mechanisms: Windows authentication and SQL Server (SQL)...

Author: Bryan C Smith Date: 06/22/2011

Harden the Database Server

Reducing the database server’s exposure to attacks (hardening) is a pretty big task. The...

Author: Bryan C Smith Date: 06/21/2011

Build Secure Database Applications with Microsoft SQL Server

The recent spate of breaches and attacks targeting various business and government computing systems...

Author: Bryan C Smith Date: 06/21/2011

<Previous