Protect and Monitor
How do you protect and monitor your databases? Auditing is one way, but Steve Jones thinks this subsystem in SQL Server needs to mature.
2009-05-06
758 reads
How do you protect and monitor your databases? Auditing is one way, but Steve Jones thinks this subsystem in SQL Server needs to mature.
2009-05-06
758 reads
In this video written by MVP Brad McGehee you can learn how to get started using the Profiler GUI.
2009-05-05
12,572 reads
Web Services has been a hot topic for a number of years now, but what, you may wonder, are these Data Services everyone's talking about lately? As the architecture of Web applications has changed and matured (with the popularity of Rich Internet Applications [RIAs], for example), there has been an increased awareness of the value of exposing raw data, minus any interface or formatting, to any service or application that wants to consume it.
2009-05-05
1,623 reads
Flash. Flash Gordon. There have been a few "Flash"es in Steve Jones career, and the newest one looks interesting.
2009-05-05
911 reads
Flash. Flash Gordon. There have been a few "Flash"es in Steve Jones career, and the newest one looks interesting.
2009-05-05
867 reads
Flash. Flash Gordon. There have been a few "Flash"es in Steve Jones career, and the newest one looks interesting.
2009-05-05
839 reads
In my security presentations, another basic I talk about is defense-in-depth. The idea here is to produce multiple layers of protection against a particular attack. For instance, imagine malicious code against your home computer. This is a case where...
2009-05-05
1,971 reads
OPENROWSET is a handy tool for retrieving data. Find out how to use the OPENROWSET function for SQL Server and Microsoft Access.
2009-05-05
4,399 reads
Transparent data encryption, otherwise known as TDE is one of the new features introduced in SQL Server 2008.
2009-05-04
20,828 reads
In the first part of this series of articles, Gail showed how to find the procedures that contributed most to performance problems. In this final part, she shows how to use query statistics to pinpoint the queries that are causing the biggest problems, and then use the query execution plans to find out which operations are the root cause.
2009-05-04
4,867 reads
The honeymoon is over, and macOS 26 Tahoe broke the Rosetta 2 emulation layer...
By Chris Yates
There are moments in technology when the ground shifts beneath our feet. Moments when...
Why Developers Shouldn’t Have sysadmin access in SQL Server 7 reasons—and exactly what to do instead It...
I have noticed sp_executesql also makes a single plan for a stmt with parameter...
Comments posted to this topic are about the item Find Invalid Objects in SQL...
If I want to track which login called a stored procedure and use the value in an audit, what function can I use to replace the xxx below?
create procedure AddNewCustomer @customername varchar(200) AS BEGIN DECLARE @added VARCHAR(100) SELECT @added = xxx IF @customername IS NOT NULL INSERT dbo.Customer ( CustomerName, AddedBy ) VALUES (@customername, @added) ENDSee possible answers