Articles

Technical Article

Building Communities with Software

Steve Jones found this link that has some great thoughts on how software should be used to help build a community. Read this if you have time and post some comments. One thing in particular we liked (read the article!) were the comments about emailing responses. Your comments on this one will help us plan as we continue to try to build a better site/community.

2003-04-15

792 reads

SQLServerCentral Article

What's In A Review?

Expanding on the issue of reviewing software for SQL Server, Steve Jones proposes some standards for reviews in this article. Please take a moment to read and comment on this proposal to better help SQL Server Central.com provide you with the information that you need.

You rated this post out of 5. Change rating

2003-04-14

3,213 reads

SQLServerCentral Article

The SQL Server Black Box

Have you ever had the problem where a user ran a query against your SQL Serer and crashed it or made the server unusable since the CPU was spiked at 100%? A SQL Server black box is the equivalent of a flight data record. The black box records all queries being passed to your SQL Server and other useful information like errors.

4.33 (3)

You rated this post out of 5. Change rating

2003-04-11

16,483 reads

SQLServerCentral Article

Standards Are a Good Thing

This week we have another article from Andy that discusses some changes he made at work in conjunction with clustering all his database servers. Not a how-to, just comments about what was changed and why. Worth reading just for the reminder about the potential gotcha that @@ServerName can represent.

You rated this post out of 5. Change rating

2003-04-09

6,160 reads

Technical Article

Free Webcast Today: SQL Server Security Best Practices

Join SQLServerCentral.com co-founder Brian Knight for this free webcast on SQL Server security best practices. In this session on Technet, we will look at how to protect your system from internal and external security factors. We will look at the types of permissions in your database objects, implementing column and row-level security, and protecting yourself from SQL Injection attacks. We'll also cover best practices for basic and advanced protection for your SQL Server system.

2003-04-02

1,994 reads

Blogs

5 Advanced Online SQL DBA Training Courses to Learn in 2024 and Beyond

By

Buckle up, database wranglers! Nowadays, SQL DBAs hold the keys to a company's most...

Dynamically Unpivot columns in SQL

By

Picture this, your data ingestion team has created a table that has the sales...

Friday Basics: RPO and RTO

By

I did a post last month titled RTO and RPO are myths unless you've...

Read the latest Blogs

Forums

Azure SQL how to grant ALTER DATABASE permission

By Coriolan

  I have the user Managed identity <myusermanagedidentity> , granted it carte blanche alter...

SQL Server Encrypt data into a file, send it and then decrypt

By GBeezy

First off, my apologies for what could potentially be a bad title! I am...

Table partitioning best practice

By JasonO

I've inherited a couple of rather large databases from my ex-colleague when I join...

Visit the forum

Question of the Day

Finding Marks

I have marked a few transactions in my code. How can I find out which marks were stored in a transaction log?

See possible answers