The Fallacy of Internal Access Only
In the wake of Shell Shock, I’ve seen some vendor advisories indicate that while their product is vulnerable, it’s only...
2014-10-07 (first published: 2014-09-30)
7,117 reads
In the wake of Shell Shock, I’ve seen some vendor advisories indicate that while their product is vulnerable, it’s only...
2014-10-07 (first published: 2014-09-30)
7,117 reads
For those able to attend my session at this year’s Carolina Technology Conference, thank you! As promised, here are the...
2014-10-06
795 reads
PASS has taken a lot of heat recently. A few folks have pointed out that you only seem to hear...
2014-09-29 (first published: 2014-09-24)
6,777 reads
Note: I feel this post is important enough to post across all my blogs.
September is Childhood Cancer Awareness Month here...
2014-09-09
550 reads
I was tagged by Mike Walsh (blog | twitter) in his post 4 Attitudes I Wish I Had Earlier As a...
2014-09-05 (first published: 2014-08-28)
8,123 reads
I will be given a webinar on how to audit SQL Server through MSSQLTips.com.
Webinar Registration Link
The abstract:
Don’t become a statistic....
2014-09-03
506 reads
Anything we can do to automate our builds and deployment should be considered. After all, the point isn’t just to...
2014-08-28 (first published: 2014-08-25)
7,614 reads
If you haven’t already, please read Denise McInerney’s post about why PASS no longer stands for the Professional Association for...
2014-08-20
656 reads
I had the opportunity to write another guest post at SQL Authority:
Finding Out What Changed in a Deleted Database
This one...
2014-08-14
1,348 reads
I was reading a book about network security monitoring and it mentioned The Cuckoo’s Egg by Cliff Stoll. Stoll’s book has been...
2014-08-13
515 reads
By HeyMo0sh
As someone who works in DevOps, I’m always focused on creating systems that are...
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
By Steve Jones
Learn how to tie a bowline knot. Practice in the dark. With one hand....
Hi everyone I asked this earlier but the desired outcome is a bit different...
Hi, I have a SQL Server instance where users connect to via Windows Authentication,...
Comments posted to this topic are about the item Multiple Deployment Processes
I have a query from a former DBA that we run on SQL Server 2025 to check on database metadata. This query references sys.sysaltfiles. I want to refactor this code to be more modern. Which DMV should I reference instead?
See possible answers