Data Insecurity: A Perspective on Data Encryption
The focus of this paper is on the protection of PII data stored within a database using encryption technologies.
2013-03-07
1,819 reads
The focus of this paper is on the protection of PII data stored within a database using encryption technologies.
2013-03-07
1,819 reads
This paper provides a foundation for understanding data replication as well as a discussion of the criteria for selecting an appropriate replication technology.
2012-12-10
2,419 reads
This article has a description of an index utilization tool that Ron Johnson uses to analyze the effectiveness and use of indexes in a system.
2012-07-04 (first published: 2011-07-05)
19,306 reads
Describes the benefits of publishing instance performance metrics including a script to generate HTML-based Performance Snapshot.
2012-02-08
6,941 reads
Part II of a discussion and demonstration of ETL of a CSV data file using SSIS.
2012-01-12
9,610 reads
The first part of two parts of a paper discussion the implementation of a "real-world" ETL example using SSIS.
2012-01-05
15,721 reads
In this article, Ron Johnson shows how you can use DMVs for proactive real-time SQL Server performance monitoring.
2011-11-17
13,491 reads
This article contains an introduction to SQL Server indexes and how they are used in your queries.
2011-02-15
23,324 reads
A planning guide for the implementation of TDE in SQL Server.
2011-01-10
7,290 reads
By Ed Elliott
SQL Server Management Studio (SSMS) has recently added support for Github Copilot. This is...
By Steve Jones
If it fails where you thought it would fail that is not a failure....
Quite a long title for a short blog post ??While deploying a DACPAC (from...
Comments posted to this topic are about the item Don't Create Workslop
Comments posted to this topic are about the item What is the original database...
Comments posted to this topic are about the item The DBScan algorithm tutorial
What is returned when this code is run?
SELECT ORIGINAL_DB_NAME()See possible answers