Dale Elizabeth Corey


SQLServerCentral Article

Exploring SQL Server 2000 Configuration Properties

The SQL Server tools are top notch and often other platforms attempt to duplicate their handiness. Enterprise Manager is one that every DBA uses and it can perform a myriad of functions to configure your server. Read this new article by Dale Elizabeth Corey that looks that the wide range of items in the Configuration Properties of this tool.

(5)

You rated this post out of 5. Change rating

2007-10-02 (first published: )

40,372 reads

SQLServerCentral Article

Litespeed for SQL Server

Your backups are critical for the success and stability of your business. However as backup sizes grow and servers proliferate, managing the backups and storing all this data becomes a challenge. Dale Elizabeth Corey brings us a look at Imceda's Litespeed for SQL Server, a fantastic utility for helping manage your backups.

(1)

You rated this post out of 5. Change rating

2005-05-11

21,998 reads

SQLServerCentral Article

Netlib Encryptionizer Review

SQL Server 2000 has a weak point in how it handles security. SA can see everything, a notion that disturbs many people, especially those that have data security requirements. Netlib has a great product that allows you to encrypt columns, tables, or databases in a way that is seemless to your application. Dale Corey takes a look at this product and how you might use it in your application.

You rated this post out of 5. Change rating

2005-03-07

8,028 reads

SQLServerCentral Article

Review: AppRadar

Security in SQL Server is every DBA's concern. Your data is critical and ensuring that it is secure and intact is your responsibility. Application Security's AppRadar is reviewed by Dale Elizabeth Corey and provides monitoring of your critical databases for malicious activity and more.

You rated this post out of 5. Change rating

2004-09-23

5,832 reads

SQLServerCentral Article

Review: Log PI

Ever have a transaction you need to roll back? Undo a fat finger? There are a number of log reading products available for SQL Server to help with you in this area. Dale Corey takes a look at LOG PI with an extensive review of the product, including a bunch of screenshots..

You rated this post out of 5. Change rating

2004-08-23

8,266 reads

SQLServerCentral Article

Review: NGSSquirrel

NGS Software is in the security business and have been very successful in finding vulnerabilities in many products, notable SQL Server. They have used their expertise to build products to help you better secure your systems. Dale Corey looks at one of those products, NGSSquirrel, which does vulnerability assessment.

(1)

You rated this post out of 5. Change rating

2004-07-30

10,662 reads

SQLServerCentral Article

Review: SQL Trace Manager

Setting up SQL Server server-side traces is not the easiest task in the world. Quantum Software Research has built a product that is an MMC add-in to manage these traces. Author Dale Corey takes a look at this product and how well it works with SQL Server 2000.

You rated this post out of 5. Change rating

2004-07-07

9,842 reads

Blogs

Webinar: Navigating the Database Landscape in 2026

By

For a number of years, we’ve produced the State of the Database Landscape report,...

Claude AI Convinced Me Not to Build an iPad App

By

I coach volleyball and I do a lot of stat stuff on paper. I...

A New Word: Dolorblindness

By

dolorblindness – n. the frustration that you’ll never be able to understand another person’s...

Read the latest Blogs

Forums

Data Warehouse Toolkit meets Star Schema: The Complete Reference

By pietlinden

Is there a good syllabus for reading these two together? (Yes, it's called the...

GPX distance and time analysis in SQL Server

By Cláudio Tereso

Comments posted to this topic are about the item GPX distance and time analysis...

The DBA is Dead; Long Live the DBA

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The DBA is Dead; Long...

Visit the forum

Question of the Day

Changing the AG Listener

In SQL Server 2025, if I want to remove an IP from a listener, what do I do?

See possible answers