Overselling Yourself
Posting online is a way of building your own brand, but you need to be careful of overselling yourself. Steve Jones talks about being careful in the impressions you create from your online presence.
Posting online is a way of building your own brand, but you need to be careful of overselling yourself. Steve Jones talks about being careful in the impressions you create from your online presence.
Now that hierarchical data structures are popular again because of XML, their full hierarchical processing is still being limited to flat two dimensional linear path processing by relational processing. This will change when database professionals realize that ANSI SQL relational processing can now support full multipath nonlinear hierarchical processing.
I recently submitted a tip regarding the existence of your backup files using the undocumented system stored procedure xp_fileexist. But how would you go about executing that script against all your SQL Server 2005 and SQL Server 2008 instances? I took that script and decided to go one step further using Policy Based Management to create a custom policy that you can then run against all your SQL Server 2005 and SQL Server 2008 instances.
The battle to secure personal and business data is a tough one, and the consequences of mishandling sensitive data can be severe. In this guest editorial, John Magnabosco argues that it's high time people overcame their fear of encryption.
Theoretical performance issue handling or handling theoretical performance issues from new author R. C. van Dijk.
SQL Server doesn't support two factor authentication, but Steve Jones thinks it might be a good idea. Perhaps it's something that will get implemented in the next version, and might even serve to better secure the platform.
Various methods of using the "For Attach" clause exist to overcome the limitations that face us when using sp_attach_db and sp_attach_single_file_db. The first installment illustrates the use of the "Create Database" statement for the "For Attach" and "for ATTACH_REBUILD_LOG" arguments, for a single .MDF file and single .LDF file.
Recent installments of our series have focused on SQL Server 2005 Express Edition's implementation of the Reporting Services component. This article addresses our temporary disregard of security restrictions by describing authentication and authorization functionality that can be leveraged to control access to published content and management characteristics.
SQL Server doesn't support two factor authentication, but Steve Jones thinks it might be a good idea. Perhaps it's something that will get implemented in the next version, and might even serve to better secure the platform.
SQL Server doesn't support two factor authentication, but Steve Jones thinks it might be a good idea. Perhaps it's something that will get implemented in the next version, and might even serve to better secure the platform.
By Steve Jones
I’ve often done some analysis of my year in different ways. Last year I...
By Steve Jones
This was Redgate in 2010, spread across the globe. First the EU/US Here’s Asia...
By John
Today is Christmas and while I do not expect anybody to actual be reading...
I have a couple of SQL Agent job steps which run PowerShell commands of...
Comments posted to this topic are about the item Database security permissions save script
I have a SQL Agent job for backing up a set of Analysis Services...
I want to use the new BASE64_ENCODE() function in SQL Server 2025, but return a string that isn't large type. What is the longest varbinary string I can pass in and still get a varchar(8000) returned?
See possible answers