ETL Performance Auditing - Part 1: Introduction to ETL Auditing
This article shows an easy way to setup a comprehensive ETL Performance auditing Solution no matter how complicated your ETL setup.
2018-07-17 (first published: 2012-06-05)
18,551 reads
This article shows an easy way to setup a comprehensive ETL Performance auditing Solution no matter how complicated your ETL setup.
2018-07-17 (first published: 2012-06-05)
18,551 reads
Learn which permissions are required to drop a database and see a test to show that these apply.
2018-07-17
22,221 reads
We all know that you should try to size tempdb appropriately, so it doesn’t need to autogrow shortly after starting up SQL Server. It isn’t always easy to do this. Therefore, when you first implement a new server and/or add new databases you should monitor the autogrowth events on tempdb. By monitoring the autogrowth events you can easily determine if you have sized tempdb appropriately.
2018-07-17
2,946 reads
This article is to explain a scenario I started facing in my work environment after some Windows Security patches rolled out .
A required privilege is not held by the client. The step failed.
2018-07-16
42,323 reads
T-SQL window functions, introduced in 2005 with enhancements in 2012, are great additions to the T-SQL language. In this article, Kathi Kellenberger explains what you need to know to get good performance when using these functions.
2018-07-16
4,197 reads
There are frequent misunderstandings about Explicit Transactions, not limited to use of 'nested transactions'. This article attempts to explain by example many of the behaviors of this feature.
2018-07-13 (first published: 2015-12-30)
18,449 reads
Brent Ozar's session for the PASS DBA Fundamentals virtual chapter.
2018-07-13
6,099 reads
This short article shows a simple example of how to generate completely random sample output from a Dataset
2018-07-12
6,875 reads
Protecting data in SQL Server is not as simple as setting a few properties. While there are great security features in SQL Server, such as Transparent Data Encryption, production data may end up in places throughout the organization. In this article, Brian Kelley talks about the best ways to secure data using the concept of least privilege.
2018-07-12
3,100 reads
What is the most efficient way to modify XML values? To allow for precise modification of XML nodes and values, the XQuery XML query language employs an extension known as the XML Data Modification Language (DML). The XML DML uses the XML modify() method, which makes use of three operational keyword sets: insert, replace value of, and delete. Seth Delconte takes a closer look.
2018-07-11
2,712 reads
By Steve Jones
I’ve often done some analysis of my year in different ways. Last year I...
By Steve Jones
This was Redgate in 2010, spread across the globe. First the EU/US Here’s Asia...
By John
Today is Christmas and while I do not expect anybody to actual be reading...
I have a couple of SQL Agent job steps which run PowerShell commands of...
Comments posted to this topic are about the item Database security permissions save script
I have a SQL Agent job for backing up a set of Analysis Services...
I want to use the new BASE64_ENCODE() function in SQL Server 2025, but return a string that isn't large type. What is the longest varbinary string I can pass in and still get a varchar(8000) returned?
See possible answers