A Cool Job
Today's editorial was originally published on August 21, 2007. It is being re-run as Steve is traveling. What a cool job it must be to try and tune and get the most performance out of a system.
Today's editorial was originally published on August 21, 2007. It is being re-run as Steve is traveling. What a cool job it must be to try and tune and get the most performance out of a system.
Even if you are not an infrastructure guy a good grasp of storage basics will stand you in good stead
Better security can be achieved by writing better code. Steve Jones agrees, but doesn't think it's as easy as it sounds.
Before you even install SQL Server, there a number of preparatory steps you need to take in order to get a new machine with a fresh copy of the operating system completely ready to install SQL Server properly. This is to maximize performance, reliability, and security.
How can you quickly and easily compare recordsets from different instances? This article will show you a quick way to do this with PowerShell.
This editorial was originally published on Sept 5, 2007. It is being re-run as Steve is traveling. Today Steve talks about the potential problems with killing SPIDs in SQL Server.
The aim of the new Database Recovery Advisor in SQL Server 2012 is to simplify the task of piecing together a recovery sequence from multiple backup files, comprising full, differential, and log backups. In this article, I'll demonstrate how the tool makes it easier to plan for, and perform, a point in time recovery from a series of backups, in order to recover data that may have been lost due to an application bug, or user error.
The task will detect changes to existing files as well as new files, both actions will cause the file to be found when available. A file is available when the task can open it exclusively. This is important for files that take a long time to be written, such as large files, or those that are just written slowly or delivered via a slow network link.
This editorial was originally published on Oct 9, 2007. It is being re-run as Steve is traveling. When I worked at JD Edwards, one of the goals of our business intelligence system was to house a single view of the truth. I recently saw a blog post by Andrew Fryer that does a good job of explaining what this actually is.
This article will show you how to use user-defined triggers to supplement your security policies, preventing unauthorised data manipulation and blocking unfriendly logins.
By Arun Sirpal
Every major model out there can summarise documents, write code and answer multi step...
By Brian Kelley
My most recent bout with imposter syndrome was with ISACA’s Digital Trust Ecosystem Framework...
By Steve Jones
“On the way to a grand goal, celebrate the smallest victories as if each...
Buka blokir Bank Danamon dapat dilakukan melalui Hello Danamon (1-500-090), WhatsApp resmi +62851=8812=0346 /...
Hi everyone, I’ve been looking into using AI for helping with data-related tasks (writing...
Graha Elok Mas, Jl. Panjang No.79 EF, RT.6/RW.1, Kedoya Sel., Kec. Kb. Jeruk, Kota...
In honor of May the fourth and Star Wars (may the force be with you), finish this quote:
"Do, or do not. ..."See possible answers