Additional Articles


External Article

Security Enhancements in SQL Server 2005: Schema

Security has become more and more important in today's business environment. From the database point of view, DBAs and system administrators need an improved security model. SQL Server 2005 provides an improved security feature. It is claimed that SQL Server 2005 is secure by default. In SQL Server 2005, the security model is divided into three areas namely authentication, authorization, and encryption.

2006-12-29

2,741 reads

External Article

Processing event logs using DumpEvt and SQL Server

As a DBA, you can find very useful information in the Windows event logs. About important events, the health of your SQL Server and the operating system it runs on. Unfortunately, the logs also contain a lot of useless information. Some applications have a tendency to log hundreds of events every day, filling up the logs very quickly with info that you, as a DBA, do not need. But you still need to see that important message that informs you the server is going to crash if you don’t take action.

2006-12-28

2,298 reads

Technical Article

Find Missing Constraints

Procedure to help find missing constraints when comparing two databases that are supposed to be the same.  SP has ability to show all constraints per database, and the ability to generate create scripts to make adding the missing constraints easier.

You rated this post out of 5. Change rating

2006-12-26 (first published: )

749 reads

Technical Article

Techniques for Uniquely Identifying Database Records

When designing and creating a data model for a data-driven application, the records in tables must each be uniquely identifiable. By having a unique value associated with each record, individual records can be selected, updated, or deleted. Being able to uniquely identify records is so important and standard in a database system that databases allow those designing a database table to specify what column (or columns) make up the primary key.

2006-12-22

3,518 reads

Blogs

A New Word: mcfeely

By

mcfeely – adj. inexplicably moved by predictable and well-worn sentiments, even if they are...

Bicep Your Elastic Jobs

By

I posted on Terraform and Azure SQL last year but wanted to see what...

3rd Party Applications Have Issues

By

As a SQL DBA, what do you do when a vendor application has performance...

Read the latest Blogs

Forums

How to install mysql-connector-python-8.4.0.zip it does not have setup.py

By ivanb

How to install mysql-connector-python-8.4.0.zip it does not have setup.py. Checked also: mysql-connector-python-8.4.0.tar.gz

when primary is down and not accessible failover not occured then how to recover

By naga.rohitkumar

HI All, can any one reply on this when primary is down and not...

The On-Call Load

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The On-Call Load

Visit the forum

Question of the Day

Two Table Hints

What happens when I run this code:

SELECT
  p.ProductName
, p.ProductCategory
FROM dbo.Product AS p WITH (NOLOCK, TABLOCK);

See possible answers