Additional Articles


External Article

SQL Server Access Control: The Basics

No technology yet invented can in any way allow us to neglect the task of ensuring the security of the database by controlling access. Security must be applied in depth, and the database is designed provide a system that will thwart even the most determined external attack. If it seems a bit complicated at first, that is no longer an excuse now that Rob Sheldon has provided this simple guide for getting started.

2016-08-25

8,113 reads

External Article

Installing Master Data Services in an AlwaysOn Environment

This article describes a solution for Master Data Service (MDS) hosted on AlwaysOn Availability Group configuration. The article describes how to install and configure SQL 2016 Master Data Services on a SQL 2016 AlwaysOn Availability group (AG). The main purpose of this solution is to improve high availability and disaster recovery of MDS backend data hosted on a SQL Server database.

2016-08-24

4,157 reads

External Article

Software Animism

Have you ever accused an application of deliberately trying to make your life a misery? Simple Talk's Tony Davis talks animism in this week's editorial, and wants to hear your stories in the comments for the chance to win a $50 Amazon gift card.

2016-08-22

5,305 reads

External Article

Windows Containers and Docker

Windows Server 2016 features support for containers. These are not Linux-based, but containers that run on Windows and run Windows on the inside. These conform to the Open Container Initiative (OCI). They allow you to run applications insulated from the rest of the system, within portable containers that include everything an application needs to be fully functional. As they did with Linux, containers will change the nature of the software supply chain for Windows users.

2016-08-19

6,766 reads

External Article

Crossing the Site Domain with JavaScript

Browsers try to prevent a range of malicious attacks by preventing content being accessed by a web page from a different domain to the one that the page was fetched from. If you have a legitimate need to do this, it is a bad idea to disable this method of defence: Instead, there are more legitimate and safer ways of performing cross-domain JavaScript calls such as JSONP or Cross-Origin Resource Sharing, as Dino explains.

2016-08-16

2,961 reads

Blogs

Ramblings about data communities and your contributions, no excuses

By

I have been active in the data community throughout my career. I have met...

SQL Server Journey till 2025 (brief)

By

Quick Summary for Microsoft SQL Server till 2025, I am fortunate to be part...

Building Power BI Reports: Desktop vs Fabric

By

Why this comparison feels confusing If you’re a Power BI report author who’s just...

Read the latest Blogs

Forums

Multi-State Payroll Tax Issues 2026

By davidholland0703

Prepare for 2026 with this essential multi-state payroll tax issues 2026 webinar from Professionals...

Simulating Mercury’s Orbital Motion Using Pure T-SQL (NASA 2025 Dataset)

By NKTgLaw

SQL Server is typically viewed as a transactional or analytical database engine. However, it...

Azure SQL Database | CREATE EVENT SESSION [Blocking_Capture] ON DATABASE

By DanielP

Hello, Is there a way in Azure SQL Database to change the 'Blocking Process...

Visit the forum

Question of the Day

String Similarity I

On SQL Server 2025, when I run this, what is returned?

SELECT EDIT_DISTANCE_SIMILARITY('SQL Server', 'MySQL')

See possible answers