How to configure SSL encryption in SQL Server
Tibor Nagy explains how to configure Secure Sockets Layer (SSL) encryption on our SQL Servers, with a trusted certificate.
2014-08-19
11,226 reads
Tibor Nagy explains how to configure Secure Sockets Layer (SSL) encryption on our SQL Servers, with a trusted certificate.
2014-08-19
11,226 reads
Deployability is now a first class concern for databases, so why isn’t it as easy as it should be? Matthew Skelton explores seven of the most common challenges which will bring your database deployments to their knees.
2014-08-18
10,398 reads
It is often generalized that seeks are better than scans in terms of retrieving data from SQL Server. The index hint FORCESCAN was recently introduced so that you could coerce the optimizer to perform a scan instead of a seek. Which might lead you to wonder: Why would I ever want a scan instead of a seek?
2014-08-15
8,926 reads
With a hybrid cloud, can you get the freedom and flexibility of a public cloud with the security and bandwidth of a private cloud? Robert Sheldon explains all the ins and outs.
2014-08-14
10,175 reads
This article looks at some automated approaches of monitoring SQL Server agent jobs.
2014-08-13
9,647 reads
In this tip, Koen Verbeeck explores how to apply business intelligence solutions to administrative tasks, specifically creating custom reports and adding them to SQL Server Management Studio.
2014-08-12
10,920 reads
In the first in a series on the practicalities of using the Microsoft Azure Platform for the SQL Server professional, Buck Woody shows that, whatever your version of SQL Server, there is a way of storing offsite backups in the cloud.
2014-08-11
9,549 reads
It is awkward to do 'Graph databases' in SQL to explore the sort of relationships and memberships in social networks because equivalence relations are classes (a set of sets) rather than sets. However one can explore graphs in SQL if the relationship has all three of the mathematical properties needed for an equivalence relationship.
2014-08-08
9,485 reads
Joe Celko & Chris Date guest as the sinister Relational Police in this new DBA Team adventure. Can the DBA Team save another doomed database? Find out.
2014-08-07
11,971 reads
Encryption brings data into a state which cannot be interpreted by anyone who does not have access to the decryption key, password, or certificates. Hashing brings a string of characters of arbitrary size into a usually shorter fixed-length value or key. Here's how to get started using it.
2014-08-06
10,471 reads
By HeyMo0sh
As a DevOps practitioner, I’ve always focused on performance, scalability, and automation. But as...
By Brian Kelley
On Patch Tuesday, in addition to OS and Office security patches, Microsoft also released...
When mirroring was first released for Azure SQL Database, it used Change Data Capture...
We have two "identical" instances of an ASP.NET web service (or so I have...
Comments posted to this topic are about the item OPENQUERY Flexibility
Comments posted to this topic are about the item A Full Shutdown
Which of these are valid OPENQUERY() uses?
See possible answers