Jumping the Gun
How quickly should security issues be reported? Steve Jones isn't sure, but he talks a bit about what we might want to do.
How quickly should security issues be reported? Steve Jones isn't sure, but he talks a bit about what we might want to do.
How quickly should security issues be reported? Steve Jones isn't sure, but he talks a bit about what we might want to do.
How quickly should security issues be reported? Steve Jones isn't sure, but he talks a bit about what we might want to do.
Although current databases limit XML processing to linear XPath or XQuery queries, existing hierarchical database techniques enable far more complex queries using standard SQL.
Continuing on with his series on the basics of being a DBA, the MAK brings us an article that shows how to restore a backup to a new database.
MVP Kathi Kellenberger covers the basics of using T-SQL to modify data in your databases.
Managing DBAs can be a challenge for both sides. Steve Jones talks a bit about some of his relationships with managers and the trouble that sometimes occurs.
This article describes how Database Administrators can manage SQL Server workload and critical system resource consumption using Resource Governor in SQL Server 2008
This is the final article of a three part series on Auditing in SQL Server 2008. This article shows how to setup a Database Audit Specification.
Steve Jones talks a bit more about the employee manager relationship in this turbulent times.
By Vinay Thakur
it has been a year since i have not written much on the blog...
By Steve Jones
on tenderhooks – adj. feeling the primal satisfaction of being needed by someone, which...
By DataOnWheels
I have been active in the data community throughout my career. I have met...
Comments posted to this topic are about the item A Quick Restore
Comments posted to this topic are about the item Guarding Against SQL Injection at...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
While doing some testing of an application, I wanted to reset my environment after doing some testing with this code:
USE DNRTest BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO /* Bunch of stuff tested here */RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens if this runs, assuming the "bunch of stuff" isn't anything affecting the instance. See possible answers