SQL Server Security Audit (Part 1) - Server Level Audit
The first of this three part series on SQL Server Security Auditing focuses on the SQL Server itself and addressing any of its security vulnerabilities.
The first of this three part series on SQL Server Security Auditing focuses on the SQL Server itself and addressing any of its security vulnerabilities.
Posting online is a way of building your own brand, but you need to be careful of overselling yourself. Steve Jones talks about being careful in the impressions you create from your online presence.
It's on Livemeeting and open to everyone. Get some lunch time training in with this group.
Posting online is a way of building your own brand, but you need to be careful of overselling yourself. Steve Jones talks about being careful in the impressions you create from your online presence.
Posting online is a way of building your own brand, but you need to be careful of overselling yourself. Steve Jones talks about being careful in the impressions you create from your online presence.
Posting online is a way of building your own brand, but you need to be careful of overselling yourself. Steve Jones talks about being careful in the impressions you create from your online presence.
Now that hierarchical data structures are popular again because of XML, their full hierarchical processing is still being limited to flat two dimensional linear path processing by relational processing. This will change when database professionals realize that ANSI SQL relational processing can now support full multipath nonlinear hierarchical processing.
I recently submitted a tip regarding the existence of your backup files using the undocumented system stored procedure xp_fileexist. But how would you go about executing that script against all your SQL Server 2005 and SQL Server 2008 instances? I took that script and decided to go one step further using Policy Based Management to create a custom policy that you can then run against all your SQL Server 2005 and SQL Server 2008 instances.
The battle to secure personal and business data is a tough one, and the consequences of mishandling sensitive data can be severe. In this guest editorial, John Magnabosco argues that it's high time people overcame their fear of encryption.
Theoretical performance issue handling or handling theoretical performance issues from new author R. C. van Dijk.
By Steve Jones
I coach volleyball and I do a lot of stat stuff on paper. I...
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
Is there a good syllabus for reading these two together? (Yes, it's called the...
Comments posted to this topic are about the item GPX distance and time analysis...
Comments posted to this topic are about the item The DBA is Dead; Long...
In SQL Server 2025, if I want to remove an IP from a listener, what do I do?
See possible answers