Paul White


Blogs

Using SQL Alerts to Spot Suspicious Activity in SQL

By

SQL doesn’t really give us too many tools out of the box to allow...

How to Change the Browser Used by SSMS for AAD Auth

By

Did you know that you can change the browser used by SQL Server Management...

Typing with Your Tongue Part 2: Voice Access

By

A few months ago, I wrote a post on how I use voice technology...

Read the latest Blogs

Forums

same Procedure with same source tables in 2 environments but delay in exec in 1

By Zond Sita

Good Morning, I have the below procedure, in both UAT & PROD same data...

DC migration SQL DB suggestion

By Raja mssql

Hi All, Our server team is planning to move  secondary data centre from one...

SSDT import into a table from .csv corruption

By atzvei

Hello everyone, I am importing from a csv file into a table. Everything works...

Visit the forum

Ask SSC Logo Ask SSC

SQL Server Q&A from the SQLServerCentral community

Get answers