2025-04-07
1,681 reads
2025-04-07
1,681 reads
2022-05-25
483 reads
2017-05-01 (first published: 2017-04-19)
1,167 reads
In this article, Thomas Knight analyzes and critiques the design of, and experience with, the "dual-level" user security in SQL Server. He then demonstrates a better theoretical alternative.
2014-02-04
4,331 reads
This script will either reoprt or 'fix' lost or orphaned users after restore for all versions of SQL.
2010-02-24 (first published: 2010-02-04)
2,239 reads
This script basically retreives all database users thier database roles for a database.
2010-02-10 (first published: 2010-01-20)
3,479 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
What is returned as a result set when I run this command without a new seed value?
See possible answers