SQL Server Security Basics: Why Would I Use SQL Server Authentication?
The standard best practice answer when it comes to connecting to SQL Server is to use Windows authentication. However, SQL...
2009-04-24
3,809 reads
The standard best practice answer when it comes to connecting to SQL Server is to use Windows authentication. However, SQL...
2009-04-24
3,809 reads
I finally finished up reading the Speed of Trust and have to say I struggled with it. I'm a big...
2009-04-23
791 reads
A little further off topic than usual today, something not about technology and work for a change. Woodworking is one...
2009-04-23
1,406 reads
Log File Sizes:
It's not unusual to see cases where database backups are taken from production and restored to a development or QA environment....
2009-04-23
1,345 reads
Hopefully, by the time we have our annual family vacation in May, the Cherry Blossoms will be out – until then...
2009-04-23
750 reads
After my editorial on portable data centers, I had a number of people knock down the idea, saying it doesn’t...
2009-04-23
816 reads
I saw this post on The Business of Software Blog about a use of Twitter to spread the word for...
2009-04-23
646 reads
I've had a few requests for these, so I'll take orders through May 8, 2009. The polo is a very...
2009-04-23
831 reads
Behind Every Great Restore is a Great Backup
I showed you how to do a database backup with powershell a few...
2009-04-22
2,513 reads
When it comes to logins to SQL Server, there are basically 3 types:
SQL Server-based loginsWindows user accountsWindows security groupsThe latter...
2009-04-22
6,932 reads
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Tlp/Wa_Cs:0817-866-887 Jl. I Gusti Ngurah Rai No.8 A-B, RT.8/RW.6, Wil, Kec. Duren Sawit, Kota...
Tlp/Wa_Cs:0817-866-887 Jl. Wolter Monginsidi No.54, RT.2/RW.4, Petogogan, Kec. Kby. Baru, Kota Jakarta Selatan, Daerah...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers