Server Hardware Standards
Standards are important in the computer business, both the hardware and software side. After looking at Coding Standards in a previous series, Steve Jones looks at the server side of standards beginning with hardware.
Standards are important in the computer business, both the hardware and software side. After looking at Coding Standards in a previous series, Steve Jones looks at the server side of standards beginning with hardware.
Ever tried to open 1 Gig ASCII file with Notepad? WordPad? Do you remember ASCII codes of Tab and Carriage Return? Enter Terminator; huge ASCII file viewer and BCP helper. Terminator reads top 10 (and more if asked) records of ASCII file of any size. It detects record terminators and calculates current cursor position (field offset) and length of selected area (field length). Best of all, it's free!
Can you block a DBA from performing certain actions on a server if he has sysadmin rights? The real answer is no, but this article shows you how to block an unknowledgable DBA from performing certain actions.
On Friday the 24th, a virus that preys on a SQL Server vulnerability began to attack networks, taking down many networks. This brief network describes the virus and how to protect yourself from it.
Moving SQL Server from one computer to another is not a very difficult thing to do, but it often stumps newbie DBAs. Of course, it needs careful planning to ensure that the SQL Server is moved completely and properly to the new machine, and with a minimal downtime and no data loss. This article introduces you to a couple of methods you can employ to move/migrate SQL Server from one computer to another.
This one is pretty interesting, Andy discusses a few things he sees in comments that not only fail to add value, they end up costing extra time. There's room for discussion here, but definitely a discussion worth having - comments can make you or break you, here's a chance to think about what you think is important in commenting and pass that on to your development team.
This application will convert your schema into a standard Word document. Try before you buy, they have two versions - both under $200.
Because of the way date and time values are stored in SQL Server, searching for a particular date or time is not as straightforward as you might think it would be. This article describes how date/time values are stored, how the database design can simplify (or complicate) data retrieval, and how to query date/time data to get the right results every time.
This article is the first of a series that I plan on writing and placing on my website to help other DBAs in auditing a new SQL Server environment. This article deals with determing which SQL Server logins have weak passwords, with the definition of weak being, no password, password the same as the login name or having a password of only one character.The stored procedure used for this article is embedded in the article and it has been submitted as a independent script named spAuditPasswords.
Continuing with our worst practices series, Steve Jones looks at another administrative no-no. Making a change to your live system on the fly.
By Bert Wagner
Until recently, my family's 90,000+ photos have been hidden away in the depths of...
By Kamil
Managing Microsoft Fabric at scale quickly becomes painful if you rely only on the...
2025 exposed a growing gap between AI ambition and operational reality. As budgets tightened...
Comments posted to this topic are about the item Celebrating Tomorrow
Comments posted to this topic are about the item SQL Art: I Made a...
I am using ssrs in visual studio 2022, I work on a report, there...
Which of these is more appropriate for tomorrow?
See possible answers