Using Encrypted Backups in SQL Server 2014
This article details encrypted backups and how they are implemented in SQL Server 2014.
2014-05-15
5,122 reads
This article details encrypted backups and how they are implemented in SQL Server 2014.
2014-05-15
5,122 reads
We recently faced an issue where an internal data provider began providing an incomplete or inaccurate files because it lacked the proper length (or didn't exceed a certain size). In our case, we implemented a check on the file before importing using PowerShell, here's what we did.
2014-05-15
2,501 reads
Dwain Camps shows that, depending on the size and characteristics of some hierarchical data, six different methods of traversal can each be the fastest at some point. He illustrates the danger in generalizing from just one set of test data, and that it's foolish to assume that just because SQL code looks neat, it will perform well.
2014-05-14
2,625 reads
This article demonstrates how to create a CLR assembly that can encrypt or decrypt a file with AES-256 cryptography, how to reference the CLR assembly from an SSIS script task, and how to generate an MD5 checksum file so that its recipient can confirm the integrity of the encrypted file.
2014-05-13
6,474 reads
This is an extract from the book Tribal SQL. In this article, Kevin Feasel explains SQL injection attacks, how to defend against them, and how to keep your Chief Information Security Officer from appearing on the nightly news.
2014-05-13
6,136 reads
A short piece that gives you the basics of how to administer the database master keys that form the basis for encryption inside of your databases.
2014-05-12
12,988 reads
Just Azure, a new site from Cerebrata (part of Red Gate), provides essential technical resources and educational articles to support the Microsoft community in navigating and understanding the rapidly evolving Azure platform.
2014-05-12
438 reads
With the introduction of SQL Server 2014 the Microsoft team has enhanced the Resource Governor to now cover I/O. Greg Larsen shows you how to set up Resource Governor to limit the resources for those large I/O operations.
2014-05-12
2,184 reads
Learn how you can get alerts when you centralize the Event log. This is part 2 of the previous article "How to centralize your SQL Server Event Logs."
2014-05-09 (first published: 2012-05-24)
7,429 reads
In this tip we have a very simple data flow using a source query with a predictable duration. The data flow takes longer to process all the rows and even larger buffers didn't make the problem go away. What can be the cause of this and how do we solve this? Koen Verbeeck explains.
2014-05-08
4,049 reads
By Steve Jones
Only a little break for me. I’m actually heading to Las Vegas today for ...
By Steve Jones
I have a presentation on finding balance in your career that got quite a...
By Brian Kelley
But as I've matured over the years, I came to realize that I needed...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item Migrate SSRS Reports to PowerBI...
Comments posted to this topic are about the item Identities and Sequences III
When thinking of the Identity property for auto incrementing columns and sequences for the same action, which can be used with the BIGINT data type?
See possible answers