Serious Security
The password issue has Steve Jones concerned. So many of us that use computing devices don't do a good job of securing our information.
The password issue has Steve Jones concerned. So many of us that use computing devices don't do a good job of securing our information.
Every Database Administrator, developer, report writer, and anyone else who writes T-SQL to access SQL Server data, must understand how to read and interpret execution plans. This book leads you right from the basics of capturing plans, through how to interrupt them in their various forms, graphical or XML, and then how to use the information you find there to diagnose the most common causes of poor query performance, and so optimize your SQL queries, and improve your indexing strategy.
The error handling of SQL Server has always been somewhat mysterious. Now at last, the THROW statement has been included in SQL Server 2012 that, when combined with the TRY...CATCH block, makes error handling far easier. Robert Sheldon explains all.
Steve Jones talks about Service Broker and messaging and how these techniques can help you build a more robust application.
Following on from the previous TSQL performance tuning article in this series, we now focus on the important topic of T-SQL “Not IN” And “Not Exists “
Today Steve Jones talks about the questions people ask on the Internet about interviews. Are they ok? Should you cram for an interview this way?
The second article that examines the output of the sp_Blitz script™ run against SQLServerCentral's database servers.
We often need to create similar SSIS packages which contain some common components such as connection managers, data flow components, log providers, event handlers, etc... So do we really need to create a package from scratch each time and add all these commonly used components in each package again and again. Is it possible to create a SSIS package with a basic structure/workflow and common components which can be used as template to create subsequent packages?
You can extend SQL Monitor to track whatever you need to watch on your own system with custom metrics. Grant Fritchey shows us how.
The various security scans of 2012 reported lots of potential problems in companies. Why don't vendors make it easier for us to install and configure their software securely?
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Comments posted to this topic are about the item We Are Eating Our Own...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers