SQL Server Security Audit (Part 3) - Operating System Level Audit
The final part of the Security Audit series examines how to secure the Windows Server operating system.
2009-09-07
2,582 reads
The final part of the Security Audit series examines how to secure the Windows Server operating system.
2009-09-07
2,582 reads
In this tip, I am going to discuss how you can get started with SMO and how you can programmatically manage a SQL Server instance with your choice of programming language.
2009-09-04
3,737 reads
This paper defines a reference configuration model (known as SQL Server Fast Track Data Warehouse) and a CPU core-balanced approach to implementing a symmetric multiprocessor (SMP)-based SQL Server data warehouse with proven performance and scalability expectations for sequential I/O data workloads.
2009-09-04
4,268 reads
Joe becomes intrigued by the way that experts make errors in any area of technology, and suggests that the problem is more that of mindsets than lack of knowledge. He illustrates the point with SQL Development by means of the "Britney Spears, Automobiles and Squids" table, and the tangled Stored procedure, and shows ways of getting rid of both procedural and non-procedural code by adopting a different programming mindset.
2009-09-03
5,983 reads
Previous T-SQL best practices articles have discussed different coding styles that led to slow and fast query executions, and ways to minimize cached plans. This article will be an extension on those concepts, focusing on how the SQL Server optimizer tries to parameterize a query if it can, as well as how you can build your own parameterized query.
2009-09-03
5,866 reads
Rodney Landrum describes in his own unique style how he, as a working DBA, goes about troubleshooting problem queries, and investigating various types of locking and blocking problems. In the process, he passes on valuable tips learned from practical, and sometimes stressful, experience.
2009-09-02
6,526 reads
This article describes the warning "SQL Server has encountered n occurrence(s) of I/O requests taking longer than 15 seconds to complete on file <filename> in database <dbname>".
2009-09-01
4,018 reads
The second in the Security Audit series looks at securing an individual database.
2009-09-01
3,028 reads
This article, the third in the T-SQL Best Practices series, discusses how to write your code to promote cached plan re-usage. Understanding how white space and comments impact whether a plan is cached or an existing plan is re-used can help you minimize the number of plans your application is caching.
2009-08-31
3,815 reads
When diagnosing issues in SQL Server I've found that sometimes I need to be able to mimic a user's session state when attempting to repeat an error they may be receiving. The smallest differences can completely change the outcome, so I need to ensure all the session settings (QUOTED_IDENTIFIER, ANSI_NULLS, and so forth) are identical between the production session and my test session. Is there an easy way to determine these settings with a single query?
2009-08-31
2,627 reads
By ChrisJenkins
Do you spend so long manipulating your data into something vaguely useful that you...
By Steve Jones
It was neat to stumble on this in the book, a piece by me,...
Forgive me for the title. Mentally I’m 12. When I started my current day...
Comments posted to this topic are about the item Microsoft Security Changes and SQL...
Comments posted to this topic are about the item Expanding into Print
Comments posted to this topic are about the item Downtime Caused by the Postgres...
In SQL Server 2025, what is returned by this code:
SELECT EDIT_DISTANCE('Steve', 'Stan')
Assume preview features are enabled. See possible answers