What Would You Do?
If someone acts suspicious at work, do you report them? What if it's the CIO? What if data security is involved?
If someone acts suspicious at work, do you report them? What if it's the CIO? What if data security is involved?
Pivot and UnPivot are key data transformation functions for SQL Server Integration Service (SSIS).
Malicious code embedded inside advertisements served on the web. What's next?
Most DBAs are constantly looking for ways to tune their servers to run better. Joe Doherty brings us the second part of his series on indexes with an in depth look at how the indexes are stored in your database.
Discusses the techniques and reasons to use opendatasource for reading text files in SQL Server 2005.
Log shipping has been a mechanism for maintaining a warm standby server for years. Though SQL Server supported log shipping with SQL Server 2000 as a part of DB Maintenance Plan, it has become a built-in feature of SQL Server 2005. This article gives brief introduction to SQL Server 2005 Log Shipping, configuration of it, monitoring of it and failing over at the disaster.
This white paper consolidates general information, best practices, and tips for designing Microsoft SQL Server Reporting Services (SSRS) reports. It is intended to provide a starting point for design questions and an overview of some of the capabilities of Reporting Services.
Building SSIS packages and deploying them to production can be a challenge as connection strings and directory structures change. Longtime SQL Server guru Jacob Sebastian brings us a technique for building packages to make this easier.
Monitoring your servers for issues and alerts is something every DBA should be doing on a regular basis. However even with a small number of servers, a DBA can easily be overwhelmed if some level of automation is not implemented. Thomas LaRock brings us a method of scanning your error logs automatically and notifying the DBA of problems.
Database administrators (DBAs) are the backbone of data-driven organizations. If you're looking to break...
By Brian Kelley
Another security fundamentals topic is authentication versus authorization. For those who have a clear...
By Steve Jones
mcfeely – adj. inexplicably moved by predictable and well-worn sentiments, even if they are...
Experts, I am learning some skills so I can troubleshoot some performance-related issues. I...
How to install mysql-connector-python-8.4.0.zip it does not have setup.py. Checked also: mysql-connector-python-8.4.0.tar.gz
HI All, can any one reply on this when primary is down and not...
What happens when I run this code:
SELECT p.ProductName , p.ProductCategory FROM dbo.Product AS p WITH (NOLOCK, TABLOCK);See possible answers