Storage - A meeting of minds
Even if you are not an infrastructure guy a good grasp of storage basics will stand you in good stead
Even if you are not an infrastructure guy a good grasp of storage basics will stand you in good stead
Better security can be achieved by writing better code. Steve Jones agrees, but doesn't think it's as easy as it sounds.
Before you even install SQL Server, there a number of preparatory steps you need to take in order to get a new machine with a fresh copy of the operating system completely ready to install SQL Server properly. This is to maximize performance, reliability, and security.
How can you quickly and easily compare recordsets from different instances? This article will show you a quick way to do this with PowerShell.
This editorial was originally published on Sept 5, 2007. It is being re-run as Steve is traveling. Today Steve talks about the potential problems with killing SPIDs in SQL Server.
The aim of the new Database Recovery Advisor in SQL Server 2012 is to simplify the task of piecing together a recovery sequence from multiple backup files, comprising full, differential, and log backups. In this article, I'll demonstrate how the tool makes it easier to plan for, and perform, a point in time recovery from a series of backups, in order to recover data that may have been lost due to an application bug, or user error.
The task will detect changes to existing files as well as new files, both actions will cause the file to be found when available. A file is available when the task can open it exclusively. This is important for files that take a long time to be written, such as large files, or those that are just written slowly or delivered via a slow network link.
This editorial was originally published on Oct 9, 2007. It is being re-run as Steve is traveling. When I worked at JD Edwards, one of the goals of our business intelligence system was to house a single view of the truth. I recently saw a blog post by Andrew Fryer that does a good job of explaining what this actually is.
This article will show you how to use user-defined triggers to supplement your security policies, preventing unauthorised data manipulation and blocking unfriendly logins.
Are you a database or BI expert supporting decisions in your company with reports or models using Microsoft tools? We want to hear how you do this and what you think of the trend towards 'self-service' analysis for business users. Share your experiences in a short survey.
PlanTrace Now Supports PostgreSQL The same plan analysis you know from...
By Steve Jones
the kinder surprise – . the point in your early adolescence when you realize...
If you’ve been following my T-SQL Snapshot Backup series, most of what I’ve covered...
Tlp/WA.(+62 821°3111°179 Jl. Kebon Bawang VII No.40 2, RT.2/RW.6, Kb. Bawang, Kec. Tj. Priok,...
Tlp/WA.(+62 821°3111°179 Jl. Cempaka Putih Raya No.118 B,C,D, Cemp. Putih Tim., Kec. Cemp. Putih,...
Tlp/WA.(+62 821°3111°179 Jl. Paus No.81, RT.1/RW.8, Wil, Kec. Pulo Gadung, Kota Jakarta Timur, Daerah...
On which Linux versions is SQL Server 2025 on Linux supported?
See possible answers