DBAs running SQL Server on Linux will not only need to understand SQL Server security well, they will also need to understand how security works on Linux. In this article, Kellyn Pot'Vin-Gorman walks you through several examples, explaining the permissions and ownership of files and directories in Linux.
As the Peer-to-Peer series continues, we set up an example topology in Peer-to-Peer Transactional replication and test it.
2018 is coming to an end, and AGs have been out for 6 years. They're stable now, right?
Steve talks about the project underway to port the SQLServerCentral codebase.
In this article, Feodor demonstrates the architecture, workflow, and some of the challenges of a collaborative platform (cloud foundation) for speeding up enterprises in their search for analytical power. He uses an example from the EA Billing solution, which was presented in the previous articles of the series.
One of the best ways to improve software is to evaluate it sooner, which includes static analysis. We don't have many tools for database code, but we need more.
In this tip we look at how we can use SQL Server to auto generate a backup script for NetBackup to make sure we backup the required databases.
By Vinay Thakur
As discussed introduction of Always Encryption blog and initial Encryption at rest as TDE...
By Vinay Thakur
Transparent Data Encryption(TDE): TDE was initially introduced in SQL Server 2008 Enterprise Edition; this...
By Steve Jones
Only a little break for me. I’m actually heading to Las Vegas today for ...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item This Week's AI Trust Problem...
Comments posted to this topic are about the item Migrate SSRS Reports to PowerBI...
When thinking of the Identity property for auto incrementing columns and sequences for the same action, which can be used with the BIGINT data type?
See possible answers