3 Log Shipping Techniques

3 Log Shipping Techniques My new article for SQL Server Magazine titled 3 Log Shipping Techniques has been posted online and will appear in an upcoming print issue. This article is a look at some very interesting techniques that use log shipping in interesting ways. Mastering these tehcniques can save you a great deal of time and frustration. You will learn how log shipping can be a very useful tool. I wrap it up with a tale of how I
read more

Hardening SQL Server

Hardening SQL Server My new article for SQL Server Magazine on Hardening SQL Server has been posted online and will appear in an upcoming print issue. This article is a brief explanation of how to secure SQL Server against malicious attack or invasion. This article can serve as a guide for preventing your SQL Servers from being compromised. Excerpt from Article Hardening SQL Server SQL Server applications rely on data, and protecting that data has never been more important than
read more

Product Review: Security Explorer by ScriptLogic

Product Review: Security Explorer by ScriptLogic Recently, I started writing for SQL Server Magazine. A couple of days ago, my first piece for the magazine was posted online. It is a product review of Security Explorer by ScriptLogic. I have just completed the first draft of future article and am beginning work on another. Excerpt from Article Security is a source of frustration for DBAs. They’re frequently asked who has what permissions in which databases and servers. Determining this information
read more