It is no good doing some or most of the aspects of SQL Server security right. You have to get them all right, because any effective penetration of your security is likely to spell disaster. If you fail in any of the ways that Robert Sheldon lists and describes, then you can't assume that your data is secure, and things are likely to go horribly wrong.
Tim O'Reilly, head of O'Reilly publishing, has been an advocate of better date movement in the world. Steve Jones has a few comments on an interview he gave earlier this year.
Did you know that scalar-valued, user-defined functions can be used in DEFAULT/CHECK CONSTRAINTs and computed columns? Learn about it...
How do you use SQL Server, and how do you expect this to change next year? Fill in Redgate's survey by May 15 and enter a prize draw to win one of 4 $50 Amazon vouchers.
In this tip, Tim Smith demonstrates how to measure a behavioral streak with SQL Server, an important skill for determining ROI and extrapolating trends.
In which Phil Factor claims that professional application development requires a broad knowledge base.
The recent SQL Server 2014 Service Pack fiasco wasn't the first, but hopefully it won't be the last.
Redgate and Ike Ellis are hosting a database source control workshop in Philadelphia PA, on June 4, 2015. Learn all you need to put your development databases in source control, using the version control system of your choice. Register while space is available.
R an SQL Server are a match made in heaven. You don't need anything special to get started beyond the basic instructions. Once you have jumped the hurdle of reliably and quickly transferring data between R and SQL Server you are ready to discover the power of a relational database when when combined with statistical computing and graphics.
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Tlp/Wa_Cs:0817-866-887 Jl. I Gusti Ngurah Rai No.8 A-B, RT.8/RW.6, Wil, Kec. Duren Sawit, Kota...
Tlp/Wa_Cs:0817-866-887 Jl. Wolter Monginsidi No.54, RT.2/RW.4, Petogogan, Kec. Kby. Baru, Kota Jakarta Selatan, Daerah...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers