Secure Programming
Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.
2009-03-18
477 reads
Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.
2009-03-18
477 reads
This article from Zach Mattson shows how you can set up custom error handling in your SSIS packages. Learn how to direct those error rows to another component for separate processing.
2009-03-17
11,731 reads
This SQL School video will introduce you to the INTERSECT command in T-SQL. MVP Andy Warren explains how this command allows you to find matching rows in a join and a UNION.
2009-03-17
4,855 reads
In a recent blog post, SQL Server expert Denny Cherry discusses adding a user interface to his Standalone SQL Agent, a replacement for the SQL Server Agent service.
2009-03-17
1,896 reads
This article shows the steps to analyze SQL Server logins and permissions to ensure that there are no logins and users that exist who are have unnecessary access
2009-03-17
3,464 reads
I received a review copy of Murach's SQL Server 2008 For Developers a couple months back and just finished up looking through it. In general I've always liked the style of the Murach books; short lessons that flow about as logically as you can do it when it often seems like you need to know it all to get anything done!
2009-03-17
1,782 reads
This year, I was asked to participate on the PASS Program Committee Management team as the “Speaker Manager.” One of my tasks is to create a Speaker’s Resource page on the SQLPASS.org website to aid speakers who want to submit session abstracts for the 2009 PASS Summit, which will be held in Seattle, WA from November 3 — 6, 2009.
2009-03-17
1,157 reads
SQL Server 2005 system views and Reporting Services are combined to break down tempdb utilization into its individual components in real time.
2009-03-16
9,289 reads
In a previous blog post on Detecting When a Login Has Implicit Access to a Database, I mentioned that having CONTROL SERVER rights means having implicit rights into the databases. Robert Davis posted a comment asking if there was a difference with respect to explicit permissions between being a member of the sysadmin fixed server role and having CONTROL SERVER rights.
2009-03-16
3,550 reads
If you don't have a witness server and your principal server goes, how do you make your mirror server the principal and bring all your databases online?
2009-03-16
2,921 reads
A short blog post about an issue with Fabric Mirroring (with Azure SQL DB...
By Steve Jones
I wrote an article recently on the JSON_OBJECTAGG function, but neglected to include an...
By HeyMo0sh
After working deep in cloud operations, I’ve learned that FinOps isn’t really about dashboards...
Comments posted to this topic are about the item PostgreSQL String Functions Part 1
Comments posted to this topic are about the item Working Better Under Pressure
Comments posted to this topic are about the item Identities and Sequences V
When thinking about the identity property and sequence objects, which of these can generate values before an insert statement is executed?
See possible answers