Attacking the Weakest Link
When I look at a system and think about its security model, the first thing I start poking around at is where I think security is weakest. For instance,...
2024-05-06
52 reads
When I look at a system and think about its security model, the first thing I start poking around at is where I think security is weakest. For instance,...
2024-05-06
52 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-24 (first published: 2024-05-03)
290 reads
he rollback plan... what to do when things go wrong to get back to where you were before the deployment or implementation. I've seen too many cases where a...
2024-05-17 (first published: 2024-05-01)
331 reads
Microsoft Fabric is the new data offering in Microsoft Azure and there is a great deal of interest in it. How do you get started? Where are the tutorials?
2024-12-23 (first published: 2024-04-29)
777 reads
In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
225 reads
The bottom line here is this: the idea that a CSP takes care of everything for you is a fallacy that really needs to die. Thompson, Graham. All-in-One CCSK...
2024-04-24
64 reads
As I look at the state of information technology today, I see one constant: rapid change. We all see it. While this is the type of post I would...
2024-05-08 (first published: 2024-04-22)
169 reads
Tomorrow, April 16, 2024, I will be giving another webcast; this one will be on SQL Server security. It’s scheduled for 1 PM EDT / 5 PM UTC. Sign...
2024-04-15
17 reads
I’ve watched teams spend a lot of time on backup strategy. They plan out the full, differential, and log backups to ensure they can successfully meet the recovery point...
2024-04-17 (first published: 2024-04-05)
303 reads
On April 16, 2024, I will be giving another webcast; this one will be on SQL Server security. Sign up link As always, the registration is free. Here’s the...
2024-03-29
93 reads
By Steve Jones
This value is something that I still hear today: our best work is done...
By gbargsley
Have you ever received the dreaded error from SQL Server that the TempDB log...
By Chris Yates
Artificial intelligence is no longer a distant concept. It is here, embedded in the...
Comments posted to this topic are about the item Planning for tomorrow, today -...
We have a BI-application that connects to input tables on a SQL Server 2022...
At work we've been getting better at writing what's known as GitHub Actions (workflows,...
I try to run this code on SQL Server 2022. All the objects exist in the database.
CREATE OR ALTER VIEW OrderShipping AS SELECT cl.CityNameID, cl.CityName, o.OrderID, o.Customer, o.OrderDate, o.CustomerID, o.cityId FROM dbo.CityList AS cl INNER JOIN dbo.[Order] AS o ON o.cityId = cl.CityNameID GO CREATE OR ALTER FUNCTION GetShipCityForOrder ( @OrderID INT ) RETURNS VARCHAR(50) WITH SCHEMABINDING AS BEGIN DECLARE @city VARCHAR(50); SELECT @city = os.CityName FROM dbo.OrderShipping AS os WHERE os.OrderID = @OrderID; RETURN @city; END; goWhat is the result? See possible answers