Why Use Named Pipes?
The other day a colleague and I were shadowing a vendor who was installing their 3rd party application on a...
2009-08-10
24,440 reads
The other day a colleague and I were shadowing a vendor who was installing their 3rd party application on a...
2009-08-10
24,440 reads
2009 PASS Summit Trip Contest:
If you want an opportunity to win an all expenses paid trip to the PASS Summit,...
2009-08-07
805 reads
I've started a blog to write down and track my personal goals:
The Goal Keeping DBA
Since Active August is part of reaching my goal...
2009-08-04
1,098 reads
I've started a blog to write down and track my personal goals:
The Goal Keeping DBA
Since Active August is part of reaching my goal...
2009-08-01
1,118 reads
Thanks to Mike Walsh for really getting this started. Active August is similar to Fit February where folks endeavor to...
2009-07-28
997 reads
In IT security, we spend so much time trying to protect servers and computers on the wire (or on wireless) that we look at OS patches, firewalls, anti-malware, etc., to protect our systems. We typically assume our physical security is sufficient. But...
2009-07-27
855 reads
In IT security, we spend so much time trying to protect servers and computers on the wire (or on wireless)...
2009-07-21
1,252 reads
Every so often I run into a fellow DBA or database developer who isn't crystal clear on how file/folder and share permissions play together. If you're an MCSE or an experienced system administrator, this should be old hat for you. However, given...
2009-07-21
2,545 reads
Recently, a fellow DBA showed me a set of documentation on a commercially available product. This is a product people pay money for to license and use. It's not an in-house developed application or a community released free sample.
2009-07-17
2,589 reads
Every so often I run into a fellow DBA or database developer who isn't crystal clear on how file/folder and...
2009-07-16
5,990 reads
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
By Steve Jones
Learn how to tie a bowline knot. Practice in the dark. With one hand....
By HeyMo0sh
As a DevOps practitioner, I’ve always focused on performance, scalability, and automation. But as...
Hi everyone I asked this earlier but the desired outcome is a bit different...
Hi, I have a SQL Server instance where users connect to via Windows Authentication,...
Comments posted to this topic are about the item Multiple Deployment Processes
I have a query from a former DBA that we run on SQL Server 2025 to check on database metadata. This query references sys.sysaltfiles. I want to refactor this code to be more modern. Which DMV should I reference instead?
See possible answers