2004-02-06
2,041 reads
2004-02-06
2,041 reads
2004-02-04
1,739 reads
2004-02-02
1,499 reads
2004-01-30
1,612 reads
In part one Chris Kempster covered a variety of security recommendations primarily for production systems. In Part two of this series he continues to explore security at a variety of levels where you may not realize you are vulnerable.
2019-10-04 (first published: 2004-01-30)
35,367 reads
2004-01-27
1,805 reads
Andy continues writing about replication, this week discussing the many options available when creating a snapshot publication. As we noted on his last article, this one may take longer than usual to load due the large number of images but we think the readability of having it all one page is worth while.
2004-01-27
12,791 reads
2004-01-22
1,858 reads
2004-01-21
2,069 reads
2004-01-20
1,856 reads
By Steve Jones
Here are the slides from my talk today: CI in Azure DevOps If you...
By Steve Jones
I got asked this question recently: I constantly see PostgreSQL on Microsoft slides, email,...
By Steve Jones
hickering – n. the habit of falling hard for whatever pretty new acquaintance happens...
Comments posted to this topic are about the item Are We Dinosaurs?
Sample query reply appreciated Getting the following error: Conversion failed when converting the varchar...
For the last few weeks every time I get into SSMS 20.2 I am...
What happens with this code:
DECLARE @Iteration INT = 0; WHILE @Iteration < 10 SELECT CustomerName, CustomerStatus FROM dbo.Customer WHERE CustomerID > 3; SET @Iteration += 1;See possible answers