Author: Ben Taylor

How Do I Implement High Volume Key Assignment?
Editorials

How Do I Implement High Volume Key Assignment?

Today I am sharing some specifics for building your own key assignment implementation, allowing you to allocate multiple key values in advance of actually creating records. When you use the database engine to create unique keys for you data you usually follow the following sequence. Add data to a table Capture the assigned key value Return the key value to […]

Editorials

High Performance Key Generation

Many times it is valuable to have a different key generator other than the internal tools built natively in your database engine. One key reason is simply performance. When you are using system assigned keys generated by your database engine it requires multiple round trips to store data that is normalized in any fashion. When you have related data where […]

Editorials

The Keys to the Kingdom

So how do you create a primary key in a table? Believe it or not, there are a few different methods that have proven useful in different scenarios. Let’s start with some of the traditional methods supported by most SQL Engines.in First there is the database generated sequential number generation from the SQL Engine itself. In SQL Server we call […]

SQL is Number One
Editorials

SQL is Number One

Do you wonder if you are working on developing skills need to keep you working in the future? Based on the latest review of job postings by codingdojo.com, if SQL is one of your skills, you have chosen the most demanded skill of the top 9 for 2017.   There are a few reasons SQL is in such high demand. […]

Get In Sequence
Editorials

Get In Sequence

oday I wanted to deomonstrate some cool things you can do with a Sequence (or sometimes called Tally) table. I put them in just about every database I create. A tally table simply has one numeric column with a sequence of numbers, say 1 to 1000. Then you can use that table to manipulate other objects in a sql query […]

Encrypting In An Image
Editorials

Encrypting In An Image

Encryption is one of the hardest things to do in a way that can’t be decrypted by a hacker. So, if you can do one way encryption, that’s a real plus. But, when you need to have something you can decrypt, the problem is more difficult. I wrote about this quite a bit a few weeks back. Today I wanted […]

Are You Human?
Editorials

Are You Human?

Does your public facing web site validate that a connected client is a person and not an automated bot? Usually you see a web site confirming that the connection on the other end is a user when there are credentials being provided, such as setting a password, or creating a user profile. One of the things I have found interesting […]

When EF Out of the Box Isn’t Good Enough
Editorials

When EF Out of the Box Isn’t Good Enough

Dynamic SQL using Entity Framework is a really cool capability. You can use dynamic SQL for any number of reasons. I have used it for custom filters, custom ordering, and other SQL features when you are able to work in Pure SQL while still having the benefit of SQL Injection protection through the user of execution parameters. There are other […]

Thoughts on Entity Framework (EF)
Editorials

Thoughts on Entity Framework (EF)

I’ve been using Entity Framework for a few years now. Having some production applications based on EF I have found some of the following guidelines to make it work for me. EF is fine for Many to Many relationships. In doing so, you create your data models with having virtual collections of the other object. Then when you map the […]

Real World SQL Proxies
Editorials

Real World SQL Proxies

Today I wanted to share an implementation of a proxy pattern for SQL databases. This story comes from a dot net implementation from a very large scale, with multiple web services all hitting the database server concurrently. The problem is that when enough services are operating, especially when they are clustered or use load balancing technology, the SQL database server […]