Community Circle
Search this blog
Steve’s tweets
- @SQLAllFather @MMarie ;) 17 hours ago
- @MMarie @jasonhorner Not sure that's true, but I'm not up to date on my horror movie trivia. 17 hours ago
- @MMarie @jasonhorner I'll beat Jason to saying "garlic", but silly Jason should know that's for vampire records, not ghost ones. 17 hours ago
The Current Book
MVP Award
Tags
- administration
- AI
- auditing
- Azure
- backup
- Backup/Recovery
- blogging
- business
- career
- career
- cell phone
- Cloud Computing
- containers
- continuous delivery
- continuous integration
- coping
- data
- data analysis
- database design
- databases
- Database Weekly
- data privacy
- dbatools
- DevOps
- disaster recovery
- DLM
- encryption
- Friday Poll
- GDPR
- Git
- goals
- hardware
- high availability
- Humor
- life
- Linux
- machine learning
- mcm
- Microsoft
- misc
- monitoring
- networking
- NoSQL
- PASS
- Performance
- powershell
- presentations
- Redgate
- republish
- sabbatical
- security
- software development
- software development
- speaking
- SQL Clone
- SQL Connections
- SQL in the City
- SQLNewBlogger
- SQL Prompt
- SQL Saturday
- sql server
- SQLServerCentral
- SSMS
- syndicated
- T-SQL
- T-SQL Tuesday
- testing
- tools
- travel
- tsqlt
- vacation
- version control
- webinar
- windows
- work
Daily Archives: August 29, 2011
The Winding Road
This is the text and images from my keynote talk at SQL Saturday #90 in Oklahoma City on August 27, 2011. This is my boss, Neil Davidson. He runs Red Gate Software as one of the two join CEOs for … Continue reading
SQL Saturday #90–Oklahoma City recap as chauffeur and speaker
I’d never been to Oklahoma City, and when Kristin Ferrier asked me to come to SQL Saturday #90 and do the keynote, I was happy to accept. It’s a short flight from Denver, and not much further from Austin, so … Continue reading
The Basic Security Model in SQL Server – Skill #3
This series of blog posts are related to my presentation, The Top Ten Skills You Need, which is scheduled for a few deliveries in 2011. Users and Objects The basic security model diagram that I use is the one below. … Continue reading