Viewing 15 posts - 1,126 through 1,140 (of 7,168 total)
Some initial thoughts on the matter:
- Verify that you have valid database backups in place before changing a live environment.
- Have a rollback plan setup ahead of time in case...
May 15, 2013 at 1:53 am
The short answer is, it depends, on far too many factors for anyone to say definitively what would be best for your environment.
Generally speaking you'll want to keep blocking to...
May 15, 2013 at 1:46 am
jhager, if you're interested, here is an article that explains why the transaction log is involved in full backups and how much of it is required:
http://www.sqlskills.com/blogs/paul/debunking-a-couple-of-myths-around-full-database-backups/%5B/url%5D
May 15, 2013 at 12:13 am
Pretty much the same deal. If you steal a backup with encrypted columns and restore it to a new instance you still need to, at minimum, be able to decrypt...
May 14, 2013 at 9:57 pm
I'm with Grant here. Time for you to put in some effort so 1. you yourself know and understand is actually running in your production environment, 2. you can explain...
May 14, 2013 at 3:48 pm
mlemay-957463 (5/14/2013)
May 14, 2013 at 3:43 pm
sjs-36273 (5/14/2013)
GilaMonster (3/4/2012)
kilkenny (2/27/2012)
May 14, 2013 at 3:23 pm
I remember one server I had to work on being hacked to us autologon so the machine logged itself in as the SQL Server service account upon reboot so the...
May 14, 2013 at 3:14 pm
What edition, version and build are you guys on?
SELECT SERVERPROPERTY('ProductVersion') AS ProductVersion,
SERVERPROPERTY('Edition') AS Edition,
...
May 14, 2013 at 3:04 pm
Lowell (5/14/2013)
if the shared drive was already set up at the operating system level, the mapped drive would be available there, which would better and more secure.
It's been a while,...
May 14, 2013 at 2:19 pm
shamshad.ali (5/14/2013)
May 14, 2013 at 2:04 pm
Ideally the network device would be setup to refer to Active Directory for Authentication, but if that is not possible and the device does it's own Authentication then you can...
May 14, 2013 at 12:33 pm
None of the DBAs I know with a system of your specs (x64) would categorically reject someone offering them an increase in RAM. That is typically a good thing.
When the...
May 14, 2013 at 11:55 am
It could, but remember that the original statement is not what is replicated, the resulting CRUD operations are (minus the R's) so blocking should be reduced.
Said another way, imagine...
May 13, 2013 at 5:24 pm
Viewing 15 posts - 1,126 through 1,140 (of 7,168 total)