Yukon Info from Microsoft
Nothing super new here that has been rumored, this article outlines some of the changes we'll get to see in the next SQL release!
Nothing super new here that has been rumored, this article outlines some of the changes we'll get to see in the next SQL release!
This article expands Steve Jones' look at ways to audit changes by examing how you can deal with the large amounts of data generated.
This is a product we haven't reviewed yet, but looks interesting. A SQL editor type app, features listed include integration with Visual SourceSafe, 'intellisense' statement completion, and keyboard macro's.
We've had a good run of jobs about job management lately, Randy sent us another one that looks at the job of job management and shows us how he tackled the problem.
Join SQLServerCentral.com co-founder Brian Knight for this free webcast on SQL Server security best practices. In this session on Technet, we will look at how to protect your system from internal and external security factors. We will look at the types of permissions in your database objects, implementing column and row-level security, and protecting yourself from SQL Injection attacks. We'll also cover best practices for basic and advanced protection for your SQL Server system.
It is always better to be proactive than reactive, when it comes to identifying and eliminating SQL Server performance issues. This article shows you how to analyze the data gathered by Profiler, to identify the performance issues. This article also provides four generic stored procedures for analyzing Profiler output.
Not even worth talking about, right? Probably, but they still exist. Read about this worst practice and pass it along.
Quite a while back Andy wrote an article about why not using primary keys and clustered indexes was a worst practice. Chris weighs in this week with a great article that gives some more in depth info on clustered indexes and why he thinks they should be used on every table.
Andy recently implemented a SAN and shares some of the info he picked up during the purchase and implementation. This article also discusses briefly the differences between SAN and NAS, and has some links to other sites for more info as well.
Join SQLServerCentral.com co-founder for this free webcast on SQL Server security best practices. In this session, we will look at how to protect your system from internal and external security factors. We will look at the types of permissions in your database objects, implementing column and row-level security, and protecting yourself from SQL Injection attacks. We'll also cover best practices for basic and advanced protection for your SQL Server system.
By Brian Kelley
I will be leading an in-person Certified Information Systems Auditor (CISA) exam prep class...
EightKB is back again for 2026! The biggest online SQL Server internals conference is...
By HeyMo0sh
Working in DevOps long enough teaches you two universal truths: That’s exactly why I...
Hi everyone I am looking at building a query to determine how much time...
Comments posted to this topic are about the item SQL Server Transactional Replication from...
Comments posted to this topic are about the item Hidden Heroes
When thinking of the Identity property for auto incrementing columns and sequences for the same action, which are explicitly linked to increment a number in a table when a new row is added?
See possible answers