Articles

Technical Article

Encrypting Without Secrets

Do you have a Web site or other system that deals in secrets of any sort? It seems like every time I give a security talk, people ask how to deal with the sticky problem of storing secrets. Connection strings with passwords are an obvious problem. You're better off simply using integrated security to get rid of those secrets, at least with SQL Server™, or an Oracle database. But what about credit card numbers and other financial or personal information? Can encryption help?

2006-01-23

2,476 reads

Technical Article

The CEO’s Guide to The Top 5 Issues that Misguide Business Intelligenc

When considering business intelligence (BI) software, it is essential to be aware of underlying issues that can seriously impact on your bottom line. In a country where most businesses have information stored in several different databases, it’s no secret that the BI strategy you choose will effect your profit and loss target. From data collection and integration to data analysis, the holy grail of Business Intelligence software combines your disparate databases to provide a decision support system that will enable you to make key conclusions using all of the available information.

2006-01-20

2,455 reads

SQLServerCentral Article

Brooke Philpott of sqlSentry

The guys that build software rarely get exposure of credit. Maybe that's why so many of them turn to open source where they get more well known. After a meeting at TechEd 2005, Andy Warren had the chance to get some interesting interview questions answered by Brooke Philpott, one of the 2 core developers of sqlSentry. And not a marketing guy.

You rated this post out of 5. Change rating

2006-01-19

5,778 reads

External Article

SQL Server and MOM 2005

In this series of articles, you will learn the basics of installing Microsoft Operations Manager 2005 as well as how to use MOM to monitor SQL Server. This article takes advantage of virtualization. We will use VMware Workstation 5 to create the lab to introduce you to the basics of installing MOM to monitor SQL Server.

2006-01-17

3,401 reads

Blogs

Resetting on the AI hype train

By

There's a great article from MIT Technology Review about resetting on the hype of...

A New Word: Etherness

By

etherness – n. the wistful feeling of looking around a gathering of loved ones,...

Vibe Coding a Login Tracking System

By

A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...

Read the latest Blogs

Forums

The Max PK Length

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Max PK Length

My experience using the GitHub Copilot in SSMS 22

By Daniel Calbimonte

Comments posted to this topic are about the item My experience using the GitHub...

The Microsoft SQL Year in Review

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Microsoft SQL Year in...

Visit the forum

Question of the Day

The Max PK Length

If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?

See possible answers