Additional Articles


External Article

The BI Journey: The Expert’s Advice – Part 1

Creating a quick dashboard with a few reports may be the beginning of a BI solution, but unless time is spent on the underlying model, it won't be adaptable enough to grow. In this article by Gogula Aryalingam, you'll see how the advice of a mentor helped a newbie understand how to create a flexible model that will lead to a valuable BI solution.

2019-03-11

2,975 reads

External Article

Benefits of Data Masking highlighted in Gartner’s 2018 Market Guide

Gartner released their 2018 Market Guide for Data Masking, providing an in-depth analysis of the market with recommendations and representative vendors – including Redgate. Gartner says that "Test data (or copy data) virtualization is a technology that is increasingly popular, when used in combination with SDM (Static Data Masking), to speed up the provisioning of and updates to target environments, in addition to significantly reducing the amount of storage required by these environments.”

2019-03-08

3,821 reads

External Article

Back to Basics; Masking Address Data

Protecting Personable Identifiable Information is central to the compliance of numerous regulations which your organization may be subject to. In this article Grant Fritchey starts with the basics of obfuscating address data with the data masking technology in SQL Provision.

2019-03-07

3,101 reads

External Article

Transform your SQL Server permissions

SQL Census helps users understand who has access to their SQL Servers (including Active Directory groups) and simplify existing SQL Server permissions. A new feature reworks discrete user permissions into database roles, giving users the same effective rights in a more controllable structure. Download and use SQL Census (in preview) for free.

2019-03-07 (first published: )

4,982 reads

External Article

Protecting Credit Card Data when Testing

Privacy regulations, ranging from GDPR to HIPAA, among many others, put strict compliance requirements on the storage and use of personal and sensitive data. In this article Grant Fritchey explains how the data masking technology in SQL Provision can help you protect credit card data while maintaining characteristics and distribution of the real thing.

2019-03-05

2,916 reads

Blogs

Deployment Pipelines in Fabric – What Are They?

By

In the realm of software development and content creation, the deployment pipeline serves as...

Ad Hoc SQL Server Help

By

I just need a few hours of your time… We get a variation of...

TempDB Internals – What’s New (SQL Server 2016 to 2022)

By

I wrote about TempDB Internals and understand that Tempdb plays very important role on...

Read the latest Blogs

Forums

A Quick Restore

By Steve Jones - SSC Editor

Comments posted to this topic are about the item A Quick Restore

Guarding Against SQL Injection at the Database Layer (SQL Server)

By Terry Jago

Comments posted to this topic are about the item Guarding Against SQL Injection at...

Ola Hallengren Index Optimize Maintenance can we have data compression = page

By JSB_89

I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...

Visit the forum

Question of the Day

A Quick Restore

While doing some testing of an application, I wanted to reset my environment after doing some testing with this code:

USE DNRTest

BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak'
GO
/*
Bunch of stuff tested here
*/RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACE
What happens if this runs, assuming the "bunch of stuff" isn't anything affecting the instance.

See possible answers