2004-02-11
1,943 reads
2004-02-11
1,943 reads
2004-02-10
1,869 reads
2004-02-06
2,047 reads
2004-02-04
1,746 reads
2004-02-02
1,505 reads
2004-01-30
1,617 reads
In part one Chris Kempster covered a variety of security recommendations primarily for production systems. In Part two of this series he continues to explore security at a variety of levels where you may not realize you are vulnerable.
2019-10-04 (first published: 2004-01-30)
35,422 reads
2004-01-27
1,811 reads
Andy continues writing about replication, this week discussing the many options available when creating a snapshot publication. As we noted on his last article, this one may take longer than usual to load due the large number of images but we think the readability of having it all one page is worth while.
2004-01-27
12,807 reads
2004-01-22
1,863 reads
By Steve Jones
on tenderhooks – adj. feeling the primal satisfaction of being needed by someone, which...
By DataOnWheels
I have been active in the data community throughout my career. I have met...
By Vinay Thakur
Quick Summary for Microsoft SQL Server till 2025, I am fortunate to be part...
hi, in an ssis for each loop over an object variable called MyListVariable, i...
SQL Server is typically viewed as a transactional or analytical database engine. However, it...
Hello, Is there a way in Azure SQL Database to change the 'Blocking Process...
On SQL Server 2025, when I run this, what is returned?
SELECT EDIT_DISTANCE_SIMILARITY('SQL Server', 'MySQL') See possible answers