My security team was recently performing security scans and they noticed that when they attempted a connection to my SQL Servers, they were getting self-signed certificates. Where does SQL Server store these certificates? Also, why were they seeing self-s
While interviewing SQL Server candidates I find that most are not aware of some of the basic differences between delete and truncate as well as whether these operations can be rolled back, so in this tip we will cover some of these aspects.
One of your last lines of defense for just about any system is to have a backup in place in case there is a need to recover some or all of your data. This is also true for SQL Server. In this tutorial we will discuss selecting the correct recovery models, what backup options are available, and how to create backups using T-SQL commands and SQL Server Management Studio.
The INFORMATION_SCHEMA views allow you to retrieve metadata about the objects within a database. These views can be found in the master database under Views / System Views and be called from any database in your SQL Server instance. In this tutorial we look at some of these INFORMATION_SCHEMA views and how they can be used.
In this tutorial we will cover some of the common issues with performance such as: deadlocks, blocking, missing and unused indexes, I/O bottlenecks, poor query plans, statistics, wait stats and fragmentation.
You CAN have high availability (HA) protection for SQL in a VMware environment without the hassles of Raw Device Mapping (RDM)! As you know, creating shared storage clusters in a VMware environment means complex implementation using RDM - and giving up important VMware features, such as Vmotion, but that doesn't have to be the case anymore.
Proactively manage all major DBMSs (Oracle, SQL Server, DB2 and Sybase) from a single common interface. Reduce training requirements and streamline collaboration among different database teams across the organization. Learn about these items and more in this product demonstration of IDERA's DBArtisan.
Want to be considered one of the best employees on your team? In your group? At your company? Looking for ideas on how you can improve your performance and be known as “one of the best?” Especially if you want to set yourself apart and grow within your organization, you’ll want to make every effort to establish yourself as a reliable, eager, competent and value-add professional! In this workshop, we’ll highlight our top 15 traits in becoming a top performer, which include being proactively helpful, providing unanticipated value, and having the mentality that building relationships with all internal and external stakeholders and providing superior customer service are part of every job description.
Security, when possible, should follow the KISS principle: Keep It Simple, Stupid! The more unnecessarily complex security is, the more likely for a weakness or vulnerability to work its way in. Therefore, it's best to start looking at security from the top down. Going the other direction tends to leave us overwhelmed in the details.