Viewing 15 posts - 3,976 through 3,990 (of 6,038 total)
Given the scenario, I'd leave power cord, mouse, umbrella, coffee, and egg bagel at the table, but not my laptop. It's too easy to just unplug and pack it with...
April 17, 2015 at 9:09 am
Gary Varga (4/17/2015)
Eric M Russell (4/17/2015)
Gary Varga (4/17/2015)
So we need to consider the failing of aspects of SLAs which might be too risky to ignore.
Just as the IT department has...
April 17, 2015 at 9:00 am
Some ALTER DATABASE operations can clear the buffer and procedure cache, so that can also explain a brief period of higher physical reads and CPU immediately following a deployment.
April 17, 2015 at 8:23 am
Below is a script I use to quickly zip through every database, looking for objects that have been created or modified in the past 24 hours. In addition to running...
April 17, 2015 at 8:11 am
Gary Varga (4/17/2015)
So we need to consider the failing of aspects of SLAs which might be too risky to ignore.
Just as the IT department has SLAs with their clients, the...
April 17, 2015 at 7:42 am
John Hanrahan (4/16/2015)
April 16, 2015 at 10:33 am
But the important thing to understand is that any scenario where data in production needs to be "fixed", the root cause is a defect or missing functionality in the application,...
April 16, 2015 at 9:26 am
Where I work, a data analyst interfaces with the end user to determine what (if anything) needs to be updated, inserted, or deleted. If they decide to proceed forward with...
April 16, 2015 at 7:23 am
Steve Jones - SSC Editor (4/15/2015)
Eric M Russell (4/15/2015)
April 15, 2015 at 11:47 am
jay-h (4/15/2015)
Eric M Russell (4/15/2015)
April 15, 2015 at 9:52 am
Walking around with your organization's production data, financial spreadsheets, or work email on your laptop is dumb in an age where VPN is an option and wifi is widely available.
April 15, 2015 at 9:20 am
syoc (4/14/2015)
April 14, 2015 at 10:22 am
Leveraging something like a botnet or backdoor trojan, a hacker doesn't even need physical access to the laptop to get at your files. The type of security threats that keep...
April 14, 2015 at 9:54 am
Consider setting up an audit event, DDL trigger, or profiler trace to keep track of when exactly a truncate operation is performed on this table. The simplist explanation is that...
April 13, 2015 at 7:43 am
Sigerson (4/9/2015)
ZZartin (4/3/2015)
Quick question Grant, how many times have you seen systems/processes fail on the 13th of the month? I can count a good handful.
In my last job I managed...
April 10, 2015 at 8:16 am
Viewing 15 posts - 3,976 through 3,990 (of 6,038 total)