Additional Articles


External Article

The BI Journey: The Expert’s Advice – Part 1

Creating a quick dashboard with a few reports may be the beginning of a BI solution, but unless time is spent on the underlying model, it won't be adaptable enough to grow. In this article by Gogula Aryalingam, you'll see how the advice of a mentor helped a newbie understand how to create a flexible model that will lead to a valuable BI solution.

2019-03-11

2,975 reads

External Article

Benefits of Data Masking highlighted in Gartner’s 2018 Market Guide

Gartner released their 2018 Market Guide for Data Masking, providing an in-depth analysis of the market with recommendations and representative vendors – including Redgate. Gartner says that "Test data (or copy data) virtualization is a technology that is increasingly popular, when used in combination with SDM (Static Data Masking), to speed up the provisioning of and updates to target environments, in addition to significantly reducing the amount of storage required by these environments.”

2019-03-08

3,821 reads

External Article

Back to Basics; Masking Address Data

Protecting Personable Identifiable Information is central to the compliance of numerous regulations which your organization may be subject to. In this article Grant Fritchey starts with the basics of obfuscating address data with the data masking technology in SQL Provision.

2019-03-07

3,101 reads

External Article

Transform your SQL Server permissions

SQL Census helps users understand who has access to their SQL Servers (including Active Directory groups) and simplify existing SQL Server permissions. A new feature reworks discrete user permissions into database roles, giving users the same effective rights in a more controllable structure. Download and use SQL Census (in preview) for free.

2019-03-07 (first published: )

4,982 reads

External Article

Protecting Credit Card Data when Testing

Privacy regulations, ranging from GDPR to HIPAA, among many others, put strict compliance requirements on the storage and use of personal and sensitive data. In this article Grant Fritchey explains how the data masking technology in SQL Provision can help you protect credit card data while maintaining characteristics and distribution of the real thing.

2019-03-05

2,916 reads

Blogs

Getting Your Data GenAI-Ready: The Next Stage of Data Maturity

By

I remember a meeting where a client’s CEO leaned in and asked me, “So,...

Learn Better: Pause to Review More

By

If you want to learn better, pause more in your learning to intentionally review.

Azure SQL Managed Instance Next-Gen: Bring on the IOPS

By

If you’ve used Azure SQL Managed Instance General Purpose, you know the drill: to...

Read the latest Blogs

Forums

Azure SQL DBA certification

By ashrukpm

Hello team Can anyone share popular azure SQL DBA certification exam code? and your...

Faster Data Engineering with Python Notebooks: The Fabric Modern Data Platform

By John Miner

Comments posted to this topic are about the item Faster Data Engineering with Python...

Which Result II

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Which Result II

Visit the forum

Question of the Day

Which Result II

I have this code in SQL Server 2022:

CREATE SCHEMA etl;
GO
CREATE TABLE etl.product
(
    ProductID INT,
    ProductName VARCHAR(100)
);
GO
INSERT etl.product
VALUES
(2, 'Bee AI Wearable');
GO
CREATE TABLE dbo.product
(
    ProductID INT,
    ProductName VARCHAR(100)
);
GO
INSERT dbo.product
VALUES
(1, 'Spiral College-ruled Notebook');
GO
CREATE OR ALTER PROCEDURE etl.GettheProduct
AS
BEGIN
    exec('SELECT ProductName FROM product;')
END;
GO
When I execute this code as a user whose default schema is dbo and has rights to the tables and proc, what is returned?

See possible answers