Auditing Your SQL Server - Part 3
This article expands Steve Jones' look at ways to audit changes by examing how you can deal with the large amounts of data generated.
This article expands Steve Jones' look at ways to audit changes by examing how you can deal with the large amounts of data generated.
This is a product we haven't reviewed yet, but looks interesting. A SQL editor type app, features listed include integration with Visual SourceSafe, 'intellisense' statement completion, and keyboard macro's.
We've had a good run of jobs about job management lately, Randy sent us another one that looks at the job of job management and shows us how he tackled the problem.
Join SQLServerCentral.com co-founder Brian Knight for this free webcast on SQL Server security best practices. In this session on Technet, we will look at how to protect your system from internal and external security factors. We will look at the types of permissions in your database objects, implementing column and row-level security, and protecting yourself from SQL Injection attacks. We'll also cover best practices for basic and advanced protection for your SQL Server system.
It is always better to be proactive than reactive, when it comes to identifying and eliminating SQL Server performance issues. This article shows you how to analyze the data gathered by Profiler, to identify the performance issues. This article also provides four generic stored procedures for analyzing Profiler output.
Not even worth talking about, right? Probably, but they still exist. Read about this worst practice and pass it along.
Quite a while back Andy wrote an article about why not using primary keys and clustered indexes was a worst practice. Chris weighs in this week with a great article that gives some more in depth info on clustered indexes and why he thinks they should be used on every table.
Andy recently implemented a SAN and shares some of the info he picked up during the purchase and implementation. This article also discusses briefly the differences between SAN and NAS, and has some links to other sites for more info as well.
Join SQLServerCentral.com co-founder for this free webcast on SQL Server security best practices. In this session, we will look at how to protect your system from internal and external security factors. We will look at the types of permissions in your database objects, implementing column and row-level security, and protecting yourself from SQL Injection attacks. We'll also cover best practices for basic and advanced protection for your SQL Server system.
MCSD's who certified using Visual Studio 6 are eligible to receive a free exam voucher for the 70-300 exam. You must register for the voucher and take the exam before Sep 30, 2003. Follow the link or visit the MCP secure site directly to register. It takes about a minute and you'll receive a code to prevent to your test vendor when you schedule the exam. Thanks, Microsoft!
By Vinay Thakur
Quick Summary for Microsoft SQL Server till 2025, I am fortunate to be part...
By Steve Jones
I’m not sure I knew identity column values could not be updated. I ran...
By Steve Jones
We had an interesting discussion about deployments in databases and how you go forward...
I have mentioned this several times over several years. Can someone please help me...
SELECT COUNT(DISTINCT Component) AS Found FROM tblComponents WHERE(Component NOT LIKE '%[a-z]%') AND(LTRIM(RTRIM(Component)) = 'GM13622')...
Comments posted to this topic are about the item Remotely Engineer Fabric Lakehouse objects:...
In a SQL Server 2025 table, called Beer, I have this data:
BeerIDBeerName 1Becks 2Fat Tire 3Mac n Jacks 4Alaskan Amber 8KirinI run this code:
SELECT JSON_OBJECTAGG(
BeerID: BeerName )
FROM beer;
What are the results? See possible answers