Viewing 15 posts - 241 through 255 (of 264 total)
Try running some of the inquery analyzer so there's no impact from the application.
Personally, given how cheap memory is, I wouldn't try to run a server with less than 2GB...
October 29, 2007 at 8:28 am
In our environment, we have folks called DBA's whose main role is to check out a privileged ID from an automated ID control system, run the scripts they are given,...
October 4, 2007 at 2:59 am
And, if you work for a company whose stock trades on a US stock exchange, you better have comprehensive change management policies in place or the SOX police will be...
September 20, 2007 at 8:39 am
Why not query the information_schema views to get the data you are looking for? All of the contents of SP's, views, etc are exposed in those views.
September 5, 2007 at 4:13 pm
As far as I know, we don't have a Business Objects Server, but we do have .net available, which I had not thought of using, as deploying executables is problematic...
August 29, 2007 at 7:28 am
We;ve managed to kill the use of Access as a development tool by simply refusing to support applications developed by users or their proxies (hiring programmers outside the normal channels)....
August 13, 2007 at 12:47 pm
A couple of points here. USB ports can be inactivated by application of a group policy when the computer is booting. It creates pain for many users, but can be...
August 10, 2007 at 3:29 pm
"Loosing your server role rights, such as sysadmin, after activating an activation role seems like a non-issue. "
This is absolutely true. I can't think of a reason why anyone should be...
July 23, 2007 at 7:58 am
Our DBA's have admin rights, but not on their primary logins that are used for general LAN access, email etc. All admin ID's are restricted to use on servers. This...
June 20, 2007 at 7:56 am
I'll second the point that access to change data on a production database should be severely restricted. Our DBA's can only change data if they login with a special ID...
May 16, 2007 at 9:03 am
We don't allow access to SQL Server by specific user id's, only thorugh group membership. We also do not use SQL logins unless required by an application. If you use...
May 11, 2007 at 11:48 am
Save the trace as a SQL script and look for the INSERT statements in the resuling .sql file.
April 26, 2007 at 9:19 am
Here's some of the things we do to ensure SOX compliance:
Have an owner for each application who is responsible for approving any changes to the application.
Each database should have an...
April 18, 2007 at 1:37 pm
We had this problem when there was a SET IDENTITY INSERT ON statement inside the cursor. Apparently, there are some non-obvious actions that are considered schema changes.
April 4, 2007 at 7:43 am
If you have several large indexes on a table it is entirely possible the index file will grow faster than the data files. Take a look at the structure of...
March 20, 2007 at 2:15 am
Viewing 15 posts - 241 through 255 (of 264 total)