DBAs running SQL Server on Linux will not only need to understand SQL Server security well, they will also need to understand how security works on Linux. In this article, Kellyn Pot'Vin-Gorman walks you through several examples, explaining the permissions and ownership of files and directories in Linux.
As the Peer-to-Peer series continues, we set up an example topology in Peer-to-Peer Transactional replication and test it.
2018 is coming to an end, and AGs have been out for 6 years. They're stable now, right?
Steve talks about the project underway to port the SQLServerCentral codebase.
In this article, Feodor demonstrates the architecture, workflow, and some of the challenges of a collaborative platform (cloud foundation) for speeding up enterprises in their search for analytical power. He uses an example from the EA Billing solution, which was presented in the previous articles of the series.
One of the best ways to improve software is to evaluate it sooner, which includes static analysis. We don't have many tools for database code, but we need more.
In this tip we look at how we can use SQL Server to auto generate a backup script for NetBackup to make sure we backup the required databases.
By Steve Jones
We had an interesting discussion about deployments in databases and how you go forward...
By ChrisJenkins
You could be tolerating limited reporting because there isn’t an off the shelf solution...
A while back I wrote a quick post on setting up key mappings in...
Comments posted to this topic are about the item Remotely Engineer Fabric Lakehouse objects:...
Comments posted to this topic are about the item Creating JSON III
Comments posted to this topic are about the item Testing is Becoming More Important
In a SQL Server 2025 table, called Beer, I have this data:
BeerIDBeerName 1Becks 2Fat Tire 3Mac n Jacks 4Alaskan Amber 8KirinI run this code:
SELECT JSON_OBJECTAGG(
BeerID: BeerName )
FROM beer;
What are the results? See possible answers