Hacked
Getting hacked is no fun. Today Steve Jones notes he's been hacked, in more ways than one and wants you to think about this at your workplace.
Getting hacked is no fun. Today Steve Jones notes he's been hacked, in more ways than one and wants you to think about this at your workplace.
Age calculation based on the right method used in real life.
Have you ever wanted to know who made a schema change to your database? If so, that information is tracked in the default trace - Greg Larsen shows how to view it.
In this article, we will show how to create reports in ASDW using SSRS
Phil Factor argues that The serious problems with working from home come not from poor productivity, but when office-based team members seem to prefer to ignore the fact that the remote workers exist.
Rob Farley contributes to T-SQL Tuesday #87, showing how he would use AT TIME ZONE to simplify reports based on an end user's time zone.
Sometimes things are not exactly how we think they are. Read the story of the missing default value and learn why.
Transparent Data Encryption (TDE) encrypts the data within the physical files of the database, the 'data at rest'. Without the original encryption certificate and master key, the data cannot be read when the drive is accessed or the physical media is stolen. The data in unencrypted data files can be read by restoring the files to another server. TDE requires planning but can be implemented without changing the database. Robert Sheldon explains how to implement TDE.
This is an investigation, to get an impression on the impact of the used disk space before and after compression considering different index types.
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
Comments posted to this topic are about the item Detecting Deadlocks Quickly
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers