Detecting Logins
A recent issue with malware and SQL Servers has Steve wondering if you would detect a new, and unapproved, login added to an instance.
A recent issue with malware and SQL Servers has Steve wondering if you would detect a new, and unapproved, login added to an instance.
You are invited to discover features of SQL Prompt that you may not even know exist. We will will walk you through the treasure map of SQL Prompt and show you where all the great features are buried.
Like any technology, AI can be used for evil instead of good. Shree Das explains several examples and what should be done to prevent the misuse of data.
Microsoft recently held the 2020 Ignite conference. Just like in previous years, there were many announcements introducing new services and expanded capabilities of existing ones, especially in Azure. Ahead of Ignite, I was asked to take a test drive of one of the new features, Azure Resource Mover (in preview). It’s easy to move a […]
In this article we take a look at setting up and configuring MySQL to run on Azure along with some performance metrics for this database platform running on Azure.
In this article, we will review how to migrate the data from on-premises SQL Server to AWS RDS for SQL Server using transactional replication. There are several ways to migrate data from on-premises SQL Server to AWS RDS for SQL Server and transactional replication is one among them. Configuring transactional replication between the on-premises SQL Server […]
It's not the first task when I start a new job, but often as a DBA or developer, I usually ask about Disaster Recovery (DR) plans sometime within the first six months. If I'm a DBA, of course I need a plan. If I'm a developer, however, I still need to understand how this might […]
SQL Compare has a simple premise: it will compare two databases, a source, and a target, and generate a script that, when executed on the target, will make its schema the same as the source. Tony Davis explores all the ways this can be helpful during database development work.
Learn about how ownership chaining allows you to limit permissions on specific database objects yet give users access through other objects such as views and stored procedures.
By Steve Jones
I coach volleyball and I do a lot of stat stuff on paper. I...
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
Is there a good syllabus for reading these two together? (Yes, it's called the...
Comments posted to this topic are about the item GPX distance and time analysis...
Comments posted to this topic are about the item The DBA is Dead; Long...
In SQL Server 2025, if I want to remove an IP from a listener, what do I do?
See possible answers