Prepping for Certification, Part 1 of ?
I thought it would be good to put my thoughts down on how to prepare for a certification. I don't know how many posts I will make on this,...
2025-09-04
5 reads
I thought it would be good to put my thoughts down on how to prepare for a certification. I don't know how many posts I will make on this,...
2025-09-04
5 reads
If you're not having success in convincing your organization to send you to this year's PASS Data Community Summit, you could win a 3-day registration by submitting some basic...
2025-08-29 (first published: 2025-08-12)
129 reads
I refresh my test SQL Servers at least monthly with a fresh VM. Setting up directories, installing SQL Server, setting up security, and restoring databases all take time. And...
2025-08-28
34 reads
For those testing SQL Server 2025 before it officially releases, Microsoft has made the first release candidate available. There's a lengthy article on all the new features that are...
2025-08-26
37 reads
How long has AI been around in different domains? What was it called before we starting using the phrase, "Artificial Intelligence?" Is Clippy included in said history? Here is...
2025-08-22 (first published: 2025-08-05)
480 reads
Today's reality is that cybercriminals are increasingly using AI to develop better attacks. This is just the latest reported technique, probably because it's starting to be used more often....
2025-08-22 (first published: 2025-08-21)
18 reads
If you are responsible for securing databases, SQL Servers and others, I would strongly urge you to read the following post by Andreas Wolter, former data security PM for...
2025-08-18 (first published: 2025-07-30)
495 reads
There are always bad actors who will seek to get access to and, likely, exfiltrate (exfil) the data. But they don't want to get caught; they don't want to...
2025-08-11
8 reads
On August 6, 2025, Microsoft announced a vulnerability with hybrid deployments because of a shared service principal between the Exchange on-premises deployment and Exchange Online. The vulnerability is found...
2025-08-07
33 reads
Back in June I blogged about pig butchering and the amount of reported losses we're seeing here in the United States of America. This type of cyber scam is...
2025-08-06
16 reads
By Steve Jones
Don’t reserve your kindest praise for a person until their eulogy. Tell them while...
I wanted to try out the new JSON index which is for the moment...
By Brian Kelley
I thought it would be good to put my thoughts down on how to...
Hi, we have a few people who like to experiment on our prod sql...
Comments posted to this topic are about the item Guidelines and Requirements
Comments posted to this topic are about the item Copying Production Schema
If I use DBCC CLONEDATABASE, can I remove some of the information from the copy?
See possible answers