SQL Server Authenticated Users, why are we still using them?
AD Authentication in SQL Server has been around for a long time, so why do we still use SQL Authentication?
AD Authentication in SQL Server has been around for a long time, so why do we still use SQL Authentication?
Tara Kizer explains that many of you are troubleshooting Parameter Sniffing issues the wrong way in production. In this three-part series, she will show you how to troubleshoot it the right way.
SQL Server 2017 now includes a new feature to represent complex relationships in data called Graph Databases. Robert Sheldon introduces Graph Databases in the first article of this new series.
With GDPR on the imminent horizon, there are many things that Data Platform engineers need to consider with regards to the rights of data subjects. Primary among these is understanding the impact of requests to be forgotten and updates to a person's data when it comes to restoring databases. If you have data that is within the scope of the GDPR then here are some thoughts on extra processes for your DR planning.
Using new features and changing code can cause problems in your environment. Always test to be sure that the impact is acceptable.
In SQL Server 2016 the availability group automatic seeding functionality is implemented. This article will detail the steps to use of SSMS with automatic seeding and its limitations.
Once you enable your database to be encrypted with Transparent Data Encryption (TDE), the physical database files, and the database backups are encrypted. If your database and database backup are encrypted, then how can you send the encrypted backup to a person outside your organization?
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Comments posted to this topic are about the item We Are Eating Our Own...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers