[Off-Topic] Looking Beyond the Technology
I've been quiet as of late, pretty much ever since i went to Bethany Summer Youth Camp (BSYC) as a...
2009-07-15
743 reads
I've been quiet as of late, pretty much ever since i went to Bethany Summer Youth Camp (BSYC) as a...
2009-07-15
743 reads
Recently, a fellow DBA showed me a set of documentation on a commercially available product. This is a product people...
2009-07-15
1,779 reads
If you haven't heard, PASS is running a contest where you could win conference registration to this year's PASS Community...
2009-06-19
1,268 reads
We had my organization's semi-annual combined IT and financial meeting this morning. At the end of these meetings awards and...
2009-06-12
669 reads
Early last week, my church suffered a lightning strike that did quite a bit of damage (relatively speaking) to computer and...
2009-06-11
834 reads
When it comes to securing a system, it's important to understand how it might be attacked. That's what surface area is all about. The surface area is the parts of the system which are exposed. For instance, in the case of a default instance of...
2009-06-10
1,874 reads
When the announcement for Bing came out, I didn't immediately go over and check it out. As a matter of...
2009-06-08
1,064 reads
Whenever I do a security presentation, I make sure to cover the Principle of Least Privilege. And when I do I boil it down to this very simple definition: Giving the rights to do the job. No more. No less.
2009-06-04
1,912 reads
This one isn't a technical post, but it's entirely appropriate to those of us in the IT field. Today was a...
2009-06-02
775 reads
On a couple of recent webcasts, I pointed out the folks were running with the local Administrator account. To start this out, I'm not a big fan of security by obfuscation. Security by obfuscation (not code obfuscation, but security by obscurity, if...
2009-06-02
2,556 reads
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
By Steve Jones
Learn how to tie a bowline knot. Practice in the dark. With one hand....
By HeyMo0sh
As a DevOps practitioner, I’ve always focused on performance, scalability, and automation. But as...
Hi, I have a SQL Server instance where users connect to via Windows Authentication,...
Comments posted to this topic are about the item Multiple Deployment Processes
Comments posted to this topic are about the item How to Use sqlpackage to...
I have a query from a former DBA that we run on SQL Server 2025 to check on database metadata. This query references sys.sysaltfiles. I want to refactor this code to be more modern. Which DMV should I reference instead?
See possible answers