Recently we had a customer who wanted to have read only access to all tables in a schema, even tables not created yet. Apparently in Microsoft SQLServer, there is a way to grant a user schema permissions and includes objects not created yet. THis quick-tip presentation will demonstrate how to setup and deploy permissions to…

Recently we had a customer who wanted to have read only access to all tables in a schema, even tables not created yet. Apparently in Microsoft SQLServer, there is a way to grant a user schema permissions and includes objects not created yet. THis quick-tip presentation will demonstrate how to setup and deploy permissions to…

Security breaches, we have all heard they happen and how they can affect an organization and how expensive it can be when they do happen not to mention reputation damage.  Well know security breach happened from DBA credential being comprimized.  What can we do, what options do we have?  This presentation will start with the…

Security breaches, we have all heard they happen and how they can affect an organization and how expensive it can be when they do happen not to mention reputation damage.  Well know security breach happened from DBA credential being comprimized.  What can we do, what options do we have?  This presentation will start with the…

Security breaches, we have all heard they happen and how they can affect an organization and how expensive it can be when they do happen not to mention reputation damage.  Well know security breach happened from DBA credential being comprimized.  What can we do, what options do we have?  This presentation will start with the…

Compliance, internal security requirements are all putting pressure on keeping the organizations data safer from insiders as well as outsiders.  We as database administrators must bring to the table ways to keep the database data safer and more secure then every before.  In this presentation we will examine technology as well as process and procedures…

Compliance, internal security requirements are all putting pressure on keeping the organizations data safer from insiders as well as outsiders.  We as database administrators must bring to the table ways to keep the database data safer and more secure then every before.  In this presentation we will examine technology as well as process and procedures…

Compliance, internal security requirements are all putting pressure on keeping the organizations data safer from insiders as well as outsiders.  We as database administrators must bring to the table ways to keep the database data safer and more secure then every before.  In this presentation we will examine technology as well as process and procedures…

Compliance, internal security requirements are all putting pressure on keeping the organizations data safer from insiders as well as outsiders.  We as database administrators must bring to the table ways to keep the database data safer and more secure then every before.  In this presentation we will examine technology as well as process and procedures…

Damian will present on new and emerging topics around high availability, maintenance and proactive actions to ensure systems maximise uptime and reduce potential service risk.