Complex Constrained Security
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
62 reads
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
62 reads
Disaster recovery planning can be hard, and we often forget about some of the non technical issues.
2019-02-05
65 reads
2019-02-04
78 reads
2019-02-04
1,173 reads
Steve is looking for entertainment suggestions after the Oscar nominations were released.
2019-02-01
59 reads
2020-01-22 (first published: 2019-01-31)
401 reads
2019-01-30
3,061 reads
2019-01-29
113 reads
From the time you rise in the morning until you close your eyes at night, your day is filled with thousands of small decisions, many that you don’t even think about. For each decision that you make, there is a probably a good choice and a poor choice available. Most of the time, the good […]
2019-01-28
142 reads
2019-01-28
126 reads
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
By Steve Jones
I had an idea for an animated view of a sales tool, and started...
Comments posted to this topic are about the item GPX distance and time analysis...
Comments posted to this topic are about the item The DBA is Dead; Long...
Comments posted to this topic are about the item Changing the AG Listener
In SQL Server 2025, if I want to remove an IP from a listener, what do I do?
See possible answers