Secure Storage
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
2009-04-28
788 reads
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
2009-04-28
788 reads
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
2009-04-28
563 reads
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
2009-04-28
544 reads
A week or so ago I posted a note about reading How to Start a Conversation and Make Friends (worth reading), and I had a comment posted to the blog by author Don Gabor. I like that kind of follow up, so I sent Don a note and a ...
2009-04-28
1,528 reads
Fast analysis, better insight and rapid deployment with minimal IT involvement: these are among the benefits of in-memory analytics, but different products are appropriate for different environments. Read our in-depth report on in-memory technologies.
2009-04-28
2,316 reads
I was a running a routine query using an equal operator on the only column of the primary key for a table and I noticed that the performance was terrible. These queries should have been flying because all I was doing was retrieving one row of data which should have been doing an index seek. When I looked at the query plan it was doing a scan instead. This tip shows you what I found and how to resolve the problem.
2009-04-27
3,197 reads
In the course of giving my security presentations over the past year, I've learned that quite a few folks have never seen the C-I-A triad before. The C-I-A triad stands for...
2009-04-27
4,580 reads
Clustering is often the first choice for high availability, but is it the best choice? A lot of people think so, but Steve Jones has other thoughts.
2009-04-27
718 reads
Clustering is often the first choice for high availability, but is it the best choice? A lot of people think so, but Steve Jones has other thoughts.
2009-04-27
689 reads
Clustering is often the first choice for high availability, but is it the best choice? A lot of people think so, but Steve Jones has other thoughts.
2009-04-27
675 reads
The honeymoon is over, and macOS 26 Tahoe broke the Rosetta 2 emulation layer...
By Chris Yates
There are moments in technology when the ground shifts beneath our feet. Moments when...
Why Developers Shouldn’t Have sysadmin access in SQL Server 7 reasons—and exactly what to do instead It...
I have noticed sp_executesql also makes a single plan for a stmt with parameter...
Comments posted to this topic are about the item Find Invalid Objects in SQL...
If I want to track which login called a stored procedure and use the value in an audit, what function can I use to replace the xxx below?
create procedure AddNewCustomer @customername varchar(200) AS BEGIN DECLARE @added VARCHAR(100) SELECT @added = xxx IF @customername IS NOT NULL INSERT dbo.Customer ( CustomerName, AddedBy ) VALUES (@customername, @added) ENDSee possible answers