Microsoft SQL Server

Log Buffer #337, A Carnival of the Vanities for DBAs

The journey is old, but the milestones are new. It’s the same old quest for excellence. Innovative questions are being asked and answered in the blogs across the Oracle, SQL Server and MySQL branches of technologies. This Log Buffer Edition relishes just that. Let’s start this Log Buffer with the exquisite blog post by Dana…

Not so good news for MCM Aspirants

A few days back, late Friday (30th August 2013) MS has made an announcement – that they are cancelling the MCM Certification, not so good news for MCM aspirants. This announcement has upset many in the SQL Community including myself. I had my own reasons, and beliefs about not attending any of the certification exam…

The death of the MCM Program

In case you’re unaware, Microsoft sent a late night email on Friday August 30th announcing it would kill off the MCM, MCSM and MCA certifications as of October 1, 2013. These are top level certifications, requiring candidates to do more than answer multiple-guess questions, and that, when achieved, really separate the experts from the rest…

Log Buffer #334, A Carnival of the Vanities for DBAs

This Log Buffer Edition starts with an awesome post by Dana Pylayeva from Rakuten LinkShare, a long term Pythian client, about her deep and insightful reflections about security. And as usual, it also brings together all the sparkling gems of Oracle, SQL Server, and MySQL. Enjoy!

Log Buffer #333, A Carnival of the Vanities for DBAs

Does size matter? This question has been teasing mankind since the beginning. But now, due to improvements in technology, size doesn’t really matter. Databases now have the features to tackle all data: big, medium, small, or very small. This Log Buffer Edition is here once again to bring you your data news of all sizes.

How to Secure Microsoft SQL Server

Security! This is a top-of-mind word for every concerned person when it comes to storing,  accessing, and sharing data, databases, or database servers. When applications are running in a restricted area, they are less likely to be exploited. However, with the increasing popularity of the Internet and the availability of applications, the security of data, databases, and database servers has…

Page 9 of 50« First...7891011...203040...Last »