I have written a number of blogs around contained databases in the past which you can search. In today’s blog we will talk about security considerations when working with contained databases. With contained authentication, the database can contain authentication information for the database users. This makes it considerably easier to move databases between servers. Some of the other blogs for reference are:
Interview Question of the Week #037 – What are the Properties of Relational Tables?
The other day in the interview, I heard this question and it sent me back to my college days as I used to hear similar questions from my professors. Here is the same question again and its answer. Question: What are the properties of the relational tables? Answers: Relational tables have…
Read MoreSQL SERVER – Edition Upgrade from Evaluation to Enterprise Core – AlwaysOn Warning!
While preparing for a demo about SQL migration, one of the demo was to show the steps needed to upgrade Evaluation edition to full version of SQL Server. The steps are pretty simple and already blogged at many place on the internet. One of my own blog also shows that:…
Read MoreSQL SERVER – Notes about scheduler with Operating Systems
Last week I visited my hometown and also made a trip to my college to relive some of my learning days. I bumped into one of my professors who was going for a class. I requested to attend and wanted to contribute. The discussion then moved to a core topic…
Read MoreSQL SERVER – Database Source Control with ApexSQL Software
This article covers the main features of ApexSQL tools that are involved with SQL source control. For the purpose of the article, we will use ApexSQL Source Control, ApexSQL Diff and ApexSQL Build.


