Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
"Extreme performance" is a term that a colleague and I coined 2 years ago to define the SQL Server performance-tuning approach that we take with our consulting customers. I'd like to explain the essence of our philosophy, which might help you...
As the main article mentions, having a login name for SQL Server only lets you in the system's front door. To access a database, you need a username in that database, and to access objects in the database, your username must have appropriate...
One of my database tables contains information about companies. All the table's companies have a name, but only companies listed on the stock market have a code. I created a unique index on the company-name field and would also like to creat...
One of my tables contains meteorological measurements per minute (e.g., temperature and humidity), and I'm trying to use a GROUP BY clause to calculate a moving daily average per month for these measurements. I want to express this average in a...
Cesar Cerrudo discovered two vulnerabilities in Microsoft SQL Server 2000 and Microsoft SQL Server Desktop Engine (MSDE) 2000. The vulnerabilities are related to a buffer overrun and SQL injection. Microsoft released Security Bulletin MS02-038 ...