Don Kiely


Don Kiely, MVP, MSCD, is a senior technology consultant specializing in developing secure desktop and Web applications that integrate databases and related technologies. When he isn’t writing software, he’s writing and speaking about it.

red security key on a computer keyboard
Using SQL Server Permissions 3
Security got a major overhaul back in SQL Server 2005, and each new version has just made things better. Permissions are far more granular than they were in earlier versions of SQL Server, and you have a lot of control over who gets to do what in your server instance.
map representing spatial data
Using SQL Server Spatial Data with .NET Applications

Learn how to get started using SQL Server's spatial data types with .NET applications.

SQL Server 2012 Keeps Your Data a Little More Secure
There's little that's revolutionary or radically new for security in SQL Server 2012, but there are a lot of nice enhancements that continue to refine server and database security.
illustration of data in a file room
Key Ways to Secure ASP.NET Applications with a SQL Server Back End
It takes a lot of work and vigilance to secure ASP.NET applications that store data in SQL Server databases. Here are some key ways to protect your data while it’s in motion and at rest in the database.
Efficient Data Management in SQL Server 2008, Part 2 1
Sparse columns can give you significant storage savings, and you can use columns sets to efficiently update or retrieve sparse column data. Filtered indexes work with sparse columns and nonsparse columns to provide improved query performance.
Efficient Data Management in SQL Server 2008, Part 1
Sparse columns in SQL Server 2008 help minimize data storage space. Learn how to implement them in your tables for better data management.
Hack Your Database Before the Hackers Do
Fortify the security of your SQL Server environment by using an assortment of tools for locating servers, identifying security best practices, cracking passwords, and finding vulnerabilities.

Digital Magazine Archives

Browse back issues of SQL Server Pro, from January 2007 through the last issue published in April 2014. Find the back issues here.


From the Blogs
Nov 3, 2015

Climb the Steps Toward Data Quality Success

Melissa Data's Data Quality Analyst Joseph Vertido explains how Gartner defines the critical data quality steps to prevent bad data from entering your systems in the first place, and then keep it clean over time....More
Sep 29, 2015

Data Breaches and Insider Threats

I’ll sound a bit like Captain Obvious for bringing this up, but it’s important to remember that security encompasses a lot more than protecting sensitive data from the specter of outsider threats like hackers. Properly implemented security policies also account for threat-models that include insiders – or people within your organization....More
Sep 15, 2015

Setting Up Additional Checks to Ensure Regular Transaction Log Backups 1

There’s simply no way to overstate the importance of regular Transaction Log Backups. Not only do they help protect from disaster, but regular execution of T-Log backups on Full (and Bulk-Logged) Recovery databases helps keep thing “fit and trim”. Most of the time, setting up a Notification for when T-Log Backup Jobs fail is enough to let you know when something goes wrong....More
SQL Server Pro Forums

Get answers to questions, share tips, and engage with the SQL Server community in our Forums.

Sponsored Introduction Continue on to (or wait seconds) ×