Articles

External Article

Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security

In Part 2, we shift our focus to securing containerized deployments and cloud infrastructure. We will cover Kubernetes security hardening, real-time monitoring, infrastructure as code (IaC) security, and shifting security left to catch misconfigurations early. These strategies will help your team secure workloads in production and respond to potential threats before they lead to a security breach.

2025-05-19

SQLServerCentral Article

How to Safely Remove a SQL Server Data File Without Downtime

Learn how to safely remove a SQL Server .ndf data file without any downtime using DBCC SHRINKFILE (EMPTYFILE). This hands-on tutorial walks through real-world Azure-based setup, data redistribution, and storage cleanup — ideal for DBAs managing enterprise SQL Server environments.

(3)

You rated this post out of 5. Change rating

2025-05-16

2,559 reads

Blogs

Vibe Coding a Login Tracking System

By

A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...

4 CPE Opportunity (Virtual) for Charity

By

Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...

Data Céilí 2026 Call for Speakers!

By

Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...

Read the latest Blogs

Forums

Deadlock graph anomaly

By Databae

I've come across what appears to be a strange deadlock anomaly. As seen in...

Stairway to Azure SQL Hyperscale Level 6: Backup and Restore Internals

By Chandan Shukla

Comments posted to this topic are about the item Stairway to Azure SQL Hyperscale...

The Challenge of AI

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Challenge of AI, which...

Visit the forum

Question of the Day

Deprecated Feature Tracking

From T-SQL, without requiring an XEvent session, can I tell which deprecated features are being used on my instance?

See possible answers