Friday Basics: RPO and RTO
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-31 (first published: 2024-05-10)
485 reads
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-31 (first published: 2024-05-10)
485 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-24 (first published: 2024-05-03)
290 reads
he rollback plan... what to do when things go wrong to get back to where you were before the deployment or implementation. I've seen too many cases where a...
2024-05-17 (first published: 2024-05-01)
332 reads
In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
226 reads
As I look at the state of information technology today, I see one constant: rapid change. We all see it. While this is the type of post I would...
2024-05-08 (first published: 2024-04-22)
169 reads
When I look at a system and think about its security model, the first thing I start poking around at is where I think security is weakest. For instance,...
2024-05-06
52 reads
The bottom line here is this: the idea that a CSP takes care of everything for you is a fallacy that really needs to die. Thompson, Graham. All-in-One CCSK...
2024-04-24
64 reads
I’ve watched teams spend a lot of time on backup strategy. They plan out the full, differential, and log backups to ensure they can successfully meet the recovery point...
2024-04-17 (first published: 2024-04-05)
303 reads
Tomorrow, April 16, 2024, I will be giving another webcast; this one will be on SQL Server security. It’s scheduled for 1 PM EDT / 5 PM UTC. Sign...
2024-04-15
17 reads
On April 16, 2024, I will be giving another webcast; this one will be on SQL Server security. Sign up link As always, the registration is free. Here’s the...
2024-03-29
93 reads
By Steve Jones
Fear is fueled by a lack of imagination. The antidote to fear is not...
The slidedeck and the SQL scripts for the session Indexing for Dummies can be...
By Chris Yates
Change is not a disruption in technology; it is the rhythm. New frameworks appear,...
Comments posted to this topic are about the item Building AI Governance and Policies-...
Why is sql doing a full scan VS seeking on the index? I've included...
We have a report that has multiple tables that list the top 15 performers...
The DBCC CHECKIDENT command is used when working with identity values. I have a table with 10 rows in it that looks like this:
TravelLogID CityID StartDate EndDate 1 1 2025-01-11 2025-01-16 2 2 2025-01-11 2025-01-16 3 3 2025-01-11 2025-01-16 4 4 2025-01-11 2025-01-16 5 5 2025-01-11 2025-01-16 6 6 2025-01-11 2025-01-16 7 7 2025-01-11 2025-01-16 8 8 2025-01-11 2025-01-16 9 9 2025-01-11 2025-01-16 10 10 2025-01-11 2025-01-16The docs for DBCC CHECKIDENT say this if I run with only the table parameter: "If the current identity value for a table is less than the maximum identity value stored in the identity column, it is reset using the maximum value in the identity column. " I run this code:
DELETE dbo.TravelLog WHERE TravelLogID >= 9 GO DBCC CHECKIDENT(TravelLog, RESEED) GO INSERT dbo.TravelLog ( CityID, StartDate, EndDate ) VALUES (4, '2025-09-14', '2025-09-17') GOWhat is the identity value for the new row inserted by the insert statement above? See possible answers