The Weekly News for Oct 6, 2008 (Database Weekly)
Steve Jones looks back at some of the news from the week ending Oct 6, 2008.
Steve Jones looks back at some of the news from the week ending Oct 6, 2008.
Steve Jones looks back at some of the news from the week ending Oct 6, 2008.
This article describes how you can use excel to pull the data from the SQL Server and use it for report generating.
Everyone wants extreme performance from their systems, but is that always the way to look at things? This Friday Steve Jones asks about how you consider performance in your purchasing decisions.
Learn how to apply the new tracing functionality in Microsoft data access technologies such as ADO.NET 2.0, MDAC 2.82, SQL Server Native Client, and the JDBC driver; and in the SQL Server network protocols and the Microsoft SQL Server 2005 database engine. You can also download associated sample code for this article.
MS Access can retrieve and measure time with millisecond precision, but only with the help of a few well-known API calls and several user-defined functions.
In this SQL School video, Brian Knight shows you how to create and use database diagrams in Management Studio.
How quickly should security issues be reported? Steve Jones isn't sure, but he talks a bit about what we might want to do.
Auditing and monitoring activity in your databases is becoming more and more important all the time. New author David Dye brings us a short introduction to using DDL triggers to help.
This article describes the process of how to configure the Windows firewall for SQL Server
By Steve Jones
One of the things a customer asked recently about Redgate Data Modeler was how...
By HeyMo0sh
Cloud environments don’t sit still. Pricing models change, services evolve, workloads grow, and suddenly...
Are you considering replatforming your SQL Server workload due to recent vendor changes, but...
Comments posted to this topic are about the item Removing TDE
Comments posted to this topic are about the item The day-to-day pressures of a...
How do I remove TDE encryption of data from database xxx?
See possible answers