Monthly Archives: August 2016

  1. The new Data Migration Assistant has been released!

    5

    August 31, 2016 by Kenneth Fisher

    Monday Bob Ward (b/t) announced on twitter that the new Data Migration Assistant had been released. First things first the …
    Continue reading

  2. Natural vs Artificial Primary Keys

    6

    August 29, 2016 by Kenneth Fisher

    There has been a long standing debate over the use of a natural primary key vs an artificial one. I …
    Continue reading

  3. Copying an on-premise Database to an Azure SQL Database

    4

    August 24, 2016 by Kenneth Fisher

    Continuing my exploration of Azure the next logical step seemed to be copying an on-premise database up to the cloud. …
    Continue reading

  4. Cloud Security

    1

    August 22, 2016 by Kenneth Fisher

    In case you hadn’t noticed I’ve recently started looking at the cloud and what it entails. Well one of those …
    Continue reading

  5. RBAR vs Batch

    10

    August 17, 2016 by Kenneth Fisher

    Many years ago Jeff Moden (of SQL Server Central fame) came up with the concept of RBAR. Row-By-Agonizing-Row. At it’s …
    Continue reading

  6. Temper, Temper

    7

    August 15, 2016 by Kenneth Fisher

    Possibly the single most influential event in my career happened over 25 years ago. I lost my temper at a …
    Continue reading

  7. Write-Only permissions

    3

    August 11, 2016 by Kenneth Fisher

    Yep, that’s right, you heard me. Write-Only not Read-Only. I was presenting SQL Server Security Basics at NTSSUG the other …
    Continue reading

  8. Azure: What’s the difference between SQL Database and SQL Server?

    5

    August 9, 2016 by Kenneth Fisher

    If you want to blog T-SQL Tuesday is a great way to get started. On the first Tuesday of each …
    Continue reading

  9. What’s the difference between LEFT and RIGHT OUTER JOINs?

    1

    August 3, 2016 by Kenneth Fisher

    A DBA walked into a bar, saw a couple of tables, and asked “Can I JOIN you?” There are several …
    Continue reading

  10. Using impersonation to allow a task without granting the required permission.

    9

    August 1, 2016 by Kenneth Fisher

    I use impersonation on a regular basis for a number of different tasks. This one is pretty basic but can …
    Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 3,755 other subscribers

Follow me on Twitter

ToadWorld Pro of the Month November 2013