Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
A variety of businesses use a type of analysis called dependency risk analysis. This type of analysis determines whether one group of items in your business (e.g., products) is overly dependent on just one item of another group (e.g., customers)...
Editor's Note: SQL Server Magazine welcomes feedback about the magazine. Send your comments to [email protected]. Please include your full name, email address, and daytime phone number with your letter. We edit all letters and replies for style...
Query Analyzer is one of the most frequently used utilities in SQL Server's tool set. As every DBA knows, Query Analyzer is essentially SQL Server's command console. Query Analyzer's GUI makes it easy to use. In fact, you can easily overlook the ...
SQL Server stores most of its metadata in system tables in the installed databases. However, SQL Server stores some configuration settings—such as login authentication mode, shortcuts to SQL Server utilities, and so on—in the registry. If SQL Ser...
I used Sybase's PowerDesigner 9.0 to create the data model that Figure 2 (in the main article) shows. The design is a conceptual data model; therefore, the foreign keys aren't displayed as attributes. Instead, the relationships imply the foreign ...
I've noticed that the SQL Server 7.0 code page for a default installation is SQL_Latin1_General_CP1_CI_AS, but SQL Server 2000's default code page is Latin1_General_CI_AS. This change makes a significant difference when I need to restore SQL...