Security Basics: Defense-in-Depth
In my security presentations, another basic I talk about is defense-in-depth. The idea here is to produce multiple layers of...
2009-04-28
4,237 reads
In my security presentations, another basic I talk about is defense-in-depth. The idea here is to produce multiple layers of...
2009-04-28
4,237 reads
I'm finally getting around to answering this one originated by Chris Shaw (@SQLShaw), as I was tagged by Jack Corbett...
2009-04-27
729 reads
In the course of giving my security presentations over the past year, I've learned that quite a few folks have never seen the C-I-A triad before. The C-I-A triad stands for...
2009-04-27
4,580 reads
C# MVP Chris Eargle (@kodefuguru on Twitter), who is also an INETA community champion and president of the Columbia Enterprise...
2009-04-24
1,006 reads
The standard best practice answer when it comes to connecting to SQL Server is to use Windows authentication. However, SQL...
2009-04-24
3,805 reads
Log File Sizes:
It's not unusual to see cases where database backups are taken from production and restored to a development or QA environment....
2009-04-23
1,343 reads
When it comes to logins to SQL Server, there are basically 3 types:
SQL Server-based loginsWindows user accountsWindows security groupsThe latter...
2009-04-22
6,931 reads
When I discuss SQL Server security, one of the basic concepts I concentrate on is the difference between logins and...
2009-04-21
22,733 reads
In the course of giving my security presentations over the past year, I've learned that quite a few folks have...
2009-04-20
9,094 reads
I was talking with a gentleman last night after the Greater Charleston .NET User Group about career development. He's not...
2009-04-17
788 reads
Every organization I talk to has the same problem dressed up in different clothes....
By DataOnWheels
I am delighted to host this month’s T-SQL Tuesday invitation. If you are new...
By alevyinroc
Ten years (and a couple jobs) ago, I wrote about naming default constraints to...
Comments posted to this topic are about the item The day-to-day pressures of a...
Hello all, I’m looking for advice on how to derive a daily snapshot table...
We need to replace our Windows server running SQL 2017. Any reason not to...
I have some data in a table that looks like this:
BeerID BeerName brewer beerdescription 1 Becks Interbrew Beck's is a German-style pilsner beer 2 Fat Tire New Belgium Toasty malt, gentle sweetness, flash of fresh hop bitterness. 3 Mac n Jacks Mac & Jack's Brewery This beer erupts with a floral, hoppy taste 4 Alaskan Amber Alaskan Brewing Alaskan Brewing Amber Ale is an "alt" style beer 8 Kirin Kirin Brewing Kirin Ichiban is a Lager-type beerIf I run this, what is returned?
select t1.[key]
from openjson((select t.* FROM Beer AS t for json path)) t1 See possible answers