#TSQL2sday: Interviewing Patterns
This T-SQL Tuesday is hosted by Kendra Little.
I’ve been told interviewing is an art. Perhaps it is. I view it...
2017-08-08
319 reads
This T-SQL Tuesday is hosted by Kendra Little.
I’ve been told interviewing is an art. Perhaps it is. I view it...
2017-08-08
319 reads
File this under “soft skills.” Let me start with a recent experience.
Last week I was leading a team of youth...
2017-08-08 (first published: 2017-07-20)
1,692 reads
This Wednesday, July 26th, at 12 PM EDT, I’ll be giving a presentation through Idera’s Geek Sync series. You will...
2017-07-24
290 reads
Whenever I’m asked about creating a security model for an application or database, I tell folks to follow the Principle...
2017-07-17 (first published: 2017-06-30)
2,941 reads
Authentication and Authorization, the first two of the three A’s of security, control who gets access to what. However, at...
2017-07-13 (first published: 2017-06-28)
1,621 reads
Having covered authentication yesterday, let’s move on the second A, authorization. Authentication was about proving identity. Now that we know...
2017-07-10 (first published: 2017-06-27)
1,661 reads
When I start talking with folks about security, one of the areas of confusion I often find has to do...
2017-07-05 (first published: 2017-06-26)
1,825 reads
If you were unable to attend this month’s PASS Security Virtual Chapter webinar, The Dirty Business of Auditing, it has...
2017-06-29
559 reads
Twitter can often be a great source of information for the SQL Community, especially with the #SQLHelp hashtag. Another resource...
2017-06-23
371 reads
On Thursday, June 22, at 1 PM EDT / 10 AM PDT, I’ll be presenting for the PASS Security Virtual Chapter.
Registration...
2017-06-19
367 reads
By Vinay Thakur
Continuing from Day 2 , we learned introduction on Generative AI and Agentic AI,...
Quite the title, so let me set the stage first. You have an Azure...
By HeyMo0sh
In the realm of software development and content creation, the deployment pipeline serves as...
Comments posted to this topic are about the item A Quick Restore
Comments posted to this topic are about the item Guarding Against SQL Injection at...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
While doing some testing of an application, I wanted to reset my environment after doing some testing with this code:
USE DNRTest BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO /* Bunch of stuff tested here */RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens if this runs, assuming the "bunch of stuff" isn't anything affecting the instance. See possible answers