Data Insecurity: A Perspective on Data Encryption
The focus of this paper is on the protection of PII data stored within a database using encryption technologies.
2013-03-07
1,823 reads
The focus of this paper is on the protection of PII data stored within a database using encryption technologies.
2013-03-07
1,823 reads
This paper provides a foundation for understanding data replication as well as a discussion of the criteria for selecting an appropriate replication technology.
2012-12-10
2,429 reads
This article has a description of an index utilization tool that Ron Johnson uses to analyze the effectiveness and use of indexes in a system.
2012-07-04 (first published: 2011-07-05)
19,312 reads
Describes the benefits of publishing instance performance metrics including a script to generate HTML-based Performance Snapshot.
2012-02-08
6,946 reads
Part II of a discussion and demonstration of ETL of a CSV data file using SSIS.
2012-01-12
9,618 reads
The first part of two parts of a paper discussion the implementation of a "real-world" ETL example using SSIS.
2012-01-05
15,733 reads
In this article, Ron Johnson shows how you can use DMVs for proactive real-time SQL Server performance monitoring.
2011-11-17
13,505 reads
This article contains an introduction to SQL Server indexes and how they are used in your queries.
2011-02-15
23,334 reads
A planning guide for the implementation of TDE in SQL Server.
2011-01-10
7,303 reads
By Steve Jones
I had an idea for an animated view of a sales tool, and started...
Next Monday, February 9, 2026, my one-day live online training SQL Server Query Tuning...
By Steve Jones
One of the features we advocates have been advocating for is a better way...
Comments posted to this topic are about the item Level 28: DAX Text Functions:...
Comments posted to this topic are about the item Creating JSON I
Comments posted to this topic are about the item Expensive CPUs
On SQL Server 2025, what happens when I run this code:
SELECT JSON_OBJECTAGG( 'City':'Denver') GOSee possible answers