Who needs data access? Not You!
With a little planning and care, we can find various ways to fulfill user requests without compromising the environment.
Related Posts:
When Too Much is Not a Good Thing December 13,...
2019-12-12
6 reads
With a little planning and care, we can find various ways to fulfill user requests without compromising the environment.
Related Posts:
When Too Much is Not a Good Thing December 13,...
2019-12-12
6 reads
Every once in a while there is an extremely valuable tool that comes along. While the footprint and use frequency of this tool may not be that big, the...
2019-12-10
11 reads
At best these phantom backups cause undue headache in troubleshooting. At worst, they make it impossible to recover in the event of a database related disaster. Join me for...
2019-11-28 (first published: 2019-11-20)
1,317 reads
At best these phantom backups cause undue headache in troubleshooting. At worst, they make it impossible to recover in the event of a database related disaster. Join me for...
2019-11-20
16 reads
Planning to upgrade/migrate requires a fair amount of prep work. Some of that prep work involves auditing your server for any users that may still be using the instance.
Related...
2019-08-09 (first published: 2019-07-17)
277 reads
Quality data is a goal we all strive to attain. Nobody wants to have bad data. Yet, despite our best efforts, the problem of bad data has its way...
2019-08-05 (first published: 2019-07-11)
523 reads
For the most part, things work the way you might expect them to work in windows - except it is on Linux. Sure some things are different, but SQL...
2019-07-29 (first published: 2019-07-10)
197 reads
This article demonstrates how to use Extended Events to determine if a database is being used by someone or something.
Related Posts:
Finding Deprecated Uses in SQL Server November 7, 2016...
2019-07-22 (first published: 2019-07-03)
967 reads
There are multiple ways of retrieving data from a table when you have a list of values. This article explores the use of the table value constructor.
Related Posts:
Correlate Trace...
2019-07-18 (first published: 2019-07-02)
661 reads
Planning to upgrade/migrate requires a fair amount of prep work. Some of that prep work involves auditing your server for any users that may still be using the instance.
Related...
2019-07-17
7 reads
Efficient query performance in Amazon Redshift often comes down to how well you manage...
By gbargsley
Welcome back to PowerShell Strikes Back. We’re three weeks in, and the training is...
By Steve Jones
Last week I was honored with a trip to Rome for the Redgate President’s...
Whatsapp 087781685647 Jl. Gajah Mada No.112 B-C-D, RT.1/RW.1, Krukut, Kec. Taman Sari, Kota Jakarta...
After upgrading 2 Merge Replicated databases to SQL 2022 and re-establishing the Merge Replication...
Comments posted to this topic are about the item Why Your Index Isn't Being...
What are the distance metric algorithms that can be used in VECTOR_DISTANCE()?
See possible answers