Improving database development with SQL Source Control
A webinar sponsored by Red Gate Software showing you how easy it can be to source control your database code. Thursday, August 19, 2010 12:00 PM EDT
A webinar sponsored by Red Gate Software showing you how easy it can be to source control your database code. Thursday, August 19, 2010 12:00 PM EDT
How can you better keep employees engaged in your company? Keep them happy and hopefully retain them for a long time? Steve Jones has some comments today.
DDL triggers enable us to audit DDL changes but there are a few missing events, design decisions and installation complications.
Performing a LEFT OUTER JOIN in TSQL is easy. The same logic in StreamInsight requires a little more work. In this presentation I show exactly how you can perform a LEFT OUTER JOIN on your event streams. Your browser cannot play this video. Learn how to fix this.
With cloud computing use growing, and SQL Server Azure becoming more popular, Steve Jones wishes this would become a product that the rest of us could deploy.
Today we have a guest editorial from Tim Mitchell that tells you how to turn a bad job into something more.
You need to periodically ascertain if there are any databases in your production environment which are not in SQL Server 2008 Compatibility Level. In this tip we cover the step by step process for setting up a policy to identify databases that are not in SQL Server 2008 Compatibility Level.
Longtime DBA David Poole brings us an interesting situation in involving setting up a user to allow Excel to query data from SQL Server.
Today we have a guest editorial from Andy Warren that talks about the value of blogging.
This document provides you with information that will help you understand the concepts of identity in SharePoint 2010 products, how Kerberos authentication plays a critical role in authentication and delegation scenarios, and the situations where Kerberos authentication should be leveraged or may be required in solution designs. The document also shows you how to configure Kerberos authentication end-to-end within your environment, including scenarios which use various service applications in SharePoint Server. Additional tools and resources are described to help you test and validate Kerberos configuration. The "Step-by-Step Configuration" sections of this document cover several SharePoint Server 2010 scenarios.
By Steve Jones
One of the things a customer asked recently about Redgate Data Modeler was how...
By HeyMo0sh
Cloud environments don’t sit still. Pricing models change, services evolve, workloads grow, and suddenly...
Are you considering replatforming your SQL Server workload due to recent vendor changes, but...
Comments posted to this topic are about the item Removing TDE
Comments posted to this topic are about the item The day-to-day pressures of a...
How do I remove TDE encryption of data from database xxx?
See possible answers