Forum Replies Created

Viewing 15 posts - 361 through 375 (of 6,034 total)

  • Reply To: What does the Future DBA Do?

    Jeff Moden wrote:

    ...

    It's funny how people think that you don't need xp_CmdShell on managed systems like Azure.

    Do they also not allow for OPENROWSET()?

    You can OPENROWSET (or BULK INSERT) from CSV, Excel,...

  • Reply To: What does the Future DBA Do?

    Azure SQL is still 99% the same familiar T-SQL we've been using for decades. Some features like Availability Groups and DBCC commands are gone, because they have been replaced with...

  • Reply To: Defending Against Ransomware

    What I'm talking about is a firewall on the PC that profiles executable for suspicious behaviour and then warns via a dialog - allowing user to whitelist or block the...

  • Reply To: Defending Against Ransomware

    It seems that modern malware detection / prevention should be more AI. It's highly unusual for an executable to traverse through \My Documents and network folders encrypting files, and that...

  • Reply To: What does the Future DBA Do?

    Aubrey Love wrote:

    ...

    Unless I flip the bill myself and do it on my own time, I’m stuck in a vintage world of DBA’s.

    Any suggestions for someone like that?

    The good news...

  • Reply To: What does the Future DBA Do?

    As a DBA in the cloud era, there are many more technologies that we need to familiarize ourselves with (PowerBI, ML, Document databases) but we don't necessarily need to know...

  • Reply To: Choosing Sequences Over Identity

    Jeff Moden wrote:

    With that, I have to ask, since MD5 returns a 16 Byte result and you convert that to BIGINT, which is an 8 Byte result (which is a whopping...

  • Reply To: Choosing Sequences Over Identity

    A recent database I created involves tables where the natural unique keys are several columns wide. Rather than using an IDENTITY or other incremental ID, for the surrogate key column...

  • Reply To: A Security Regression

    I don't know for sure either, but reading the FAQ, it seems like this wasn't a 3rd party hack but perhaps two employees abusing their privileges. I can picture a...

  • Reply To: Mongodb Encryption

    Our company has a mobile app that allows customers to make payments, update contact info, look at purchase history, etc. We have an enterprise data warehouse that works great for...

  • Reply To: Server Side SSMS

    When we provision a instance, we will set SQL Server max mem so that at least 4 - 8 GB memory is free for both Widows and SSMS. If I'm...

  • Reply To: Have You Deployed an Availability Group?

    "Or maybe you've done it once or twice and forgotten about it."

    Well, once you've deployed an Availability Group, it's impossible to just forget about about. It's an endless source of...

  • Reply To: Next Person Up

    Doctor Who 2 wrote:

    Extremely good advise, Steve. I'll add just one thing and that's if you find you need to look for another job, it might mean relocating, if the opportunities aren't...

  • Reply To: Next Person Up

    Most of the organizations I've worked for were IT centric - where folks tend to be rational, competent, and focused on their job. The better employers will weed out individuals...

  • Reply To: Cursors Without Performance Penalties

    Any candidate who fails to get the joke doesn't get a 2nd interview. 🙂

Viewing 15 posts - 361 through 375 (of 6,034 total)