Using Encrypted Backups in SQL Server 2014
This article details encrypted backups and how they are implemented in SQL Server 2014.
2014-05-15
5,116 reads
This article details encrypted backups and how they are implemented in SQL Server 2014.
2014-05-15
5,116 reads
We recently faced an issue where an internal data provider began providing an incomplete or inaccurate files because it lacked the proper length (or didn't exceed a certain size). In our case, we implemented a check on the file before importing using PowerShell, here's what we did.
2014-05-15
2,501 reads
Dwain Camps shows that, depending on the size and characteristics of some hierarchical data, six different methods of traversal can each be the fastest at some point. He illustrates the danger in generalizing from just one set of test data, and that it's foolish to assume that just because SQL code looks neat, it will perform well.
2014-05-14
2,625 reads
This article demonstrates how to create a CLR assembly that can encrypt or decrypt a file with AES-256 cryptography, how to reference the CLR assembly from an SSIS script task, and how to generate an MD5 checksum file so that its recipient can confirm the integrity of the encrypted file.
2014-05-13
6,467 reads
This is an extract from the book Tribal SQL. In this article, Kevin Feasel explains SQL injection attacks, how to defend against them, and how to keep your Chief Information Security Officer from appearing on the nightly news.
2014-05-13
6,136 reads
A short piece that gives you the basics of how to administer the database master keys that form the basis for encryption inside of your databases.
2014-05-12
12,976 reads
Just Azure, a new site from Cerebrata (part of Red Gate), provides essential technical resources and educational articles to support the Microsoft community in navigating and understanding the rapidly evolving Azure platform.
2014-05-12
438 reads
With the introduction of SQL Server 2014 the Microsoft team has enhanced the Resource Governor to now cover I/O. Greg Larsen shows you how to set up Resource Governor to limit the resources for those large I/O operations.
2014-05-12
2,184 reads
Learn how you can get alerts when you centralize the Event log. This is part 2 of the previous article "How to centralize your SQL Server Event Logs."
2014-05-09 (first published: 2012-05-24)
7,429 reads
In this tip we have a very simple data flow using a source query with a predictable duration. The data flow takes longer to process all the rows and even larger buffers didn't make the problem go away. What can be the cause of this and how do we solve this? Koen Verbeeck explains.
2014-05-08
4,049 reads
When mirroring was first released for Azure SQL Database, it used Change Data Capture...
By Steve Jones
One of the things I’ve tried hard to do in database development situations if...
By DataOnWheels
The T-SQL Tuesday topic this month comes James Serra. What career risks have you...
This delightful corner of our community celebrates the lighter, funnier side of artificial intelligence,...
We have two "identical" instances of an ASP.NET web service (or so I have...
Comments posted to this topic are about the item OPENQUERY Flexibility
Which of these are valid OPENQUERY() uses?
See possible answers