Second Normal Form
In this article Tom Thomson takes a look at what second normal form means, how it is violated, and how you can fix it. This is part of our normalization series.
In this article Tom Thomson takes a look at what second normal form means, how it is violated, and how you can fix it. This is part of our normalization series.
We're pretty confident that we have locked down and encrypted our financial data, but a lot of our customer's PII (Personally Identifiable Information) data is still held in unencrypted form. This data is able to be selected directly by read only business users on many of our downstream reporting, datawarehouse and standby servers. The rise of identity theft makes protecting this data imperative. DBAs are the custodians of this information and must protect it like we protect our own personal information. Recent publicity over the theft of Sony PSN data underscores both the economic and ethical importance of protecting personal data.
This editorial was originally published on Feb 17, 2006. Steve is traveling in the UK this week and we are re-printing some old pieces. This one talks about a search engine for code.
Fabiano Amorim was asked a couple of questions about SQL Server Distribution Statistics. Having given an answer based on his current knowledge, he then decided to find out for himself whether what he'd said was right, and started an epic journey of exploration into Distribution Statistics and the way that the Query Optimiser uses them.
This editorial was originally published on Jan 9, 2006. Steve is traveling to the UK this week and we are reprinting a few older editorials. This editorial talks about the health of your eyes, a topic of concern for those of us that work with computers regularly.
Fabiano Amorim was asked a couple of questions about SQL Server Distribution Statistics. Having given an answer based on his current knowledge, he then decided to find out for himself whether what he'd said was right, and started an epic journey of exploration into Distribution Statistics and the way that the Query Optimiser uses them.
Learn how to create a Windows 2008\SQL Server 2008 virtual cluster in this three part series.
Steve Jones stops halfway through the year to look over the things that he ought to be doing to better manage systems as a DBA and reminds you to do the same.
This editorial was originally published on Dec 30, 2005. Steve is traveling to the UK this week and we are reprinting editorials.
By HeyMo0sh
As someone who works in DevOps, I’m always focused on creating systems that are...
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
By Steve Jones
Learn how to tie a bowline knot. Practice in the dark. With one hand....
Hi everyone I asked this earlier but the desired outcome is a bit different...
Hi, I have a SQL Server instance where users connect to via Windows Authentication,...
Comments posted to this topic are about the item Multiple Deployment Processes
I have a query from a former DBA that we run on SQL Server 2025 to check on database metadata. This query references sys.sysaltfiles. I want to refactor this code to be more modern. Which DMV should I reference instead?
See possible answers