Storage - A meeting of minds
Even if you are not an infrastructure guy a good grasp of storage basics will stand you in good stead
Even if you are not an infrastructure guy a good grasp of storage basics will stand you in good stead
Better security can be achieved by writing better code. Steve Jones agrees, but doesn't think it's as easy as it sounds.
Before you even install SQL Server, there a number of preparatory steps you need to take in order to get a new machine with a fresh copy of the operating system completely ready to install SQL Server properly. This is to maximize performance, reliability, and security.
How can you quickly and easily compare recordsets from different instances? This article will show you a quick way to do this with PowerShell.
This editorial was originally published on Sept 5, 2007. It is being re-run as Steve is traveling. Today Steve talks about the potential problems with killing SPIDs in SQL Server.
The aim of the new Database Recovery Advisor in SQL Server 2012 is to simplify the task of piecing together a recovery sequence from multiple backup files, comprising full, differential, and log backups. In this article, I'll demonstrate how the tool makes it easier to plan for, and perform, a point in time recovery from a series of backups, in order to recover data that may have been lost due to an application bug, or user error.
The task will detect changes to existing files as well as new files, both actions will cause the file to be found when available. A file is available when the task can open it exclusively. This is important for files that take a long time to be written, such as large files, or those that are just written slowly or delivered via a slow network link.
This editorial was originally published on Oct 9, 2007. It is being re-run as Steve is traveling. When I worked at JD Edwards, one of the goals of our business intelligence system was to house a single view of the truth. I recently saw a blog post by Andrew Fryer that does a good job of explaining what this actually is.
This article will show you how to use user-defined triggers to supplement your security policies, preventing unauthorised data manipulation and blocking unfriendly logins.
Are you a database or BI expert supporting decisions in your company with reports or models using Microsoft tools? We want to hear how you do this and what you think of the trend towards 'self-service' analysis for business users. Share your experiences in a short survey.
Thank you to everyone who participated in T-SQL Tuesday #198! When I wrote the...
Efficient query performance in Amazon Redshift often comes down to how well you manage...
By gbargsley
Welcome back to PowerShell Strikes Back. We’re three weeks in, and the training is...
If you are looking for India’s best FSSAI Third Party Auditing Services in India....
If you are looking for India’s best FSSAI Third Party Auditing Services in India....
Recently, our dev teams approach me for advice on improving their huge heap table...
What are the distance metric algorithms that can be used in VECTOR_DISTANCE()?
See possible answers