2016-04-27
1,394 reads
2016-04-27
1,394 reads
2016-03-17
1,055 reads
2016-02-11
1,302 reads
Running the sp_change_users_login @Action=Report against all databases with a simple cursor wrapped around it.
2016-02-23 (first published: 2016-02-04)
1,227 reads
2016-02-03
1,374 reads
2016-01-26
1,432 reads
2015-12-28
1,142 reads
2015-12-24
1,647 reads
It's 15 years after the beginning of the century. Time to eliminate the security exposure of SQL logins, and implement integrated security. Active Directory Groups make this easy for the DBA.
2018-02-02 (first published: 2015-12-21)
9,725 reads
This article details SMKs, DMKs and certificates in SQL Server as they relate to Transparent Data Encryption and Encrypted Backups.
2015-12-09
4,960 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
What is returned as a result set when I run this command without a new seed value?
See possible answers