DBAs running SQL Server on Linux will not only need to understand SQL Server security well, they will also need to understand how security works on Linux. In this article, Kellyn Pot'Vin-Gorman walks you through several examples, explaining the permissions and ownership of files and directories in Linux.
As the Peer-to-Peer series continues, we set up an example topology in Peer-to-Peer Transactional replication and test it.
2018 is coming to an end, and AGs have been out for 6 years. They're stable now, right?
Steve talks about the project underway to port the SQLServerCentral codebase.
In this article, Feodor demonstrates the architecture, workflow, and some of the challenges of a collaborative platform (cloud foundation) for speeding up enterprises in their search for analytical power. He uses an example from the EA Billing solution, which was presented in the previous articles of the series.
One of the best ways to improve software is to evaluate it sooner, which includes static analysis. We don't have many tools for database code, but we need more.
In this tip we look at how we can use SQL Server to auto generate a backup script for NetBackup to make sure we backup the required databases.
By Steve Jones
Thanks to everyone for attending my session on running a Local LLM. If you...
By Steve Jones
I do believe that Redgate has been very customer focused since it’s inception. I’ve...
By gbargsley
It's 2 AM. Your phone is going off. Users can't connect to the application,...
Hi everyone I am getting below warning when I run SSIS: Warning: 0x80049304 at...
Comments posted to this topic are about the item Let's Talk Community Events!
Hi as shown below a replication target requires a primary key. if we want...
By default, how often is the SQL Server Database Engine checking for deadlocks?
See possible answers