SQL Server Security Audit (Part 1) - Server Level Audit
The first of this three part series on SQL Server Security Auditing focuses on the SQL Server itself and addressing any of its security vulnerabilities.
2009-08-26
3,129 reads
The first of this three part series on SQL Server Security Auditing focuses on the SQL Server itself and addressing any of its security vulnerabilities.
2009-08-26
3,129 reads
It's on Livemeeting and open to everyone. Get some lunch time training in with this group.
2009-08-25
391 reads
Posting online is a way of building your own brand, but you need to be careful of overselling yourself. Steve Jones talks about being careful in the impressions you create from your online presence.
2009-08-25
900 reads
Posting online is a way of building your own brand, but you need to be careful of overselling yourself. Steve Jones talks about being careful in the impressions you create from your online presence.
2009-08-25
586 reads
Posting online is a way of building your own brand, but you need to be careful of overselling yourself. Steve Jones talks about being careful in the impressions you create from your online presence.
2009-08-25
624 reads
Now that hierarchical data structures are popular again because of XML, their full hierarchical processing is still being limited to flat two dimensional linear path processing by relational processing. This will change when database professionals realize that ANSI SQL relational processing can now support full multipath nonlinear hierarchical processing.
2009-08-25
3,326 reads
I recently submitted a tip regarding the existence of your backup files using the undocumented system stored procedure xp_fileexist. But how would you go about executing that script against all your SQL Server 2005 and SQL Server 2008 instances? I took that script and decided to go one step further using Policy Based Management to create a custom policy that you can then run against all your SQL Server 2005 and SQL Server 2008 instances.
2009-08-25
2,712 reads
Theoretical performance issue handling or handling theoretical performance issues from new author R. C. van Dijk.
2009-08-24
4,754 reads
Various methods of using the "For Attach" clause exist to overcome the limitations that face us when using sp_attach_db and sp_attach_single_file_db. The first installment illustrates the use of the "Create Database" statement for the "For Attach" and "for ATTACH_REBUILD_LOG" arguments, for a single .MDF file and single .LDF file.
2009-08-24
2,945 reads
Recent installments of our series have focused on SQL Server 2005 Express Edition's implementation of the Reporting Services component. This article addresses our temporary disregard of security restrictions by describing authentication and authorization functionality that can be leveraged to control access to published content and management characteristics.
2009-08-24
2,699 reads
By gbargsley
It's 2 AM. Your phone is going off. Users can't connect to the application,...
By Steve Jones
I discovered a procedure recently that I wasn’t aware of: sp_sequence_get_range. This post looks...
By Arun Sirpal
After a year away getting to grips with AI and its application across the...
Comments posted to this topic are about the item Local Agents
Comments posted to this topic are about the item Detecting Deadlocks
Comments posted to this topic are about the item Introducing the Relational Embedding Retrieval...
By default, how often is the SQL Server Database Engine checking for deadlocks?
See possible answers