Storage - A meeting of minds
Even if you are not an infrastructure guy a good grasp of storage basics will stand you in good stead
Even if you are not an infrastructure guy a good grasp of storage basics will stand you in good stead
Better security can be achieved by writing better code. Steve Jones agrees, but doesn't think it's as easy as it sounds.
Before you even install SQL Server, there a number of preparatory steps you need to take in order to get a new machine with a fresh copy of the operating system completely ready to install SQL Server properly. This is to maximize performance, reliability, and security.
How can you quickly and easily compare recordsets from different instances? This article will show you a quick way to do this with PowerShell.
This editorial was originally published on Sept 5, 2007. It is being re-run as Steve is traveling. Today Steve talks about the potential problems with killing SPIDs in SQL Server.
The aim of the new Database Recovery Advisor in SQL Server 2012 is to simplify the task of piecing together a recovery sequence from multiple backup files, comprising full, differential, and log backups. In this article, I'll demonstrate how the tool makes it easier to plan for, and perform, a point in time recovery from a series of backups, in order to recover data that may have been lost due to an application bug, or user error.
The task will detect changes to existing files as well as new files, both actions will cause the file to be found when available. A file is available when the task can open it exclusively. This is important for files that take a long time to be written, such as large files, or those that are just written slowly or delivered via a slow network link.
This editorial was originally published on Oct 9, 2007. It is being re-run as Steve is traveling. When I worked at JD Edwards, one of the goals of our business intelligence system was to house a single view of the truth. I recently saw a blog post by Andrew Fryer that does a good job of explaining what this actually is.
This article will show you how to use user-defined triggers to supplement your security policies, preventing unauthorised data manipulation and blocking unfriendly logins.
Are you a database or BI expert supporting decisions in your company with reports or models using Microsoft tools? We want to hear how you do this and what you think of the trend towards 'self-service' analysis for business users. Share your experiences in a short survey.
By Arun Sirpal
As part of my wider work exploring Claude Code and AI-assisted database engineering, I...
By Bert Wagner
Train Wreck The last time I watched a high school band nearly fall apart mid-performance...
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
Comments posted to this topic are about the item Why Your Index Isn't Being...
Comments posted to this topic are about the item Distance Metric Algorithms
Comments posted to this topic are about the item What Can AI Really Do?
What are the distance metric algorithms that can be used in VECTOR_DISTANCE()?
See possible answers