2014-11-13
2,109 reads
2014-11-13
2,109 reads
Arshad Ali demonstrates granular level encryption in detail and explains how it differs from Transparent Data Encryption (TDE).
2014-07-04
6,349 reads
This article details encrypted backups and how they are implemented in SQL Server 2014.
2014-05-15
5,103 reads
A short piece that gives you the basics of how to administer the database master keys that form the basis for encryption inside of your databases.
2014-05-12
12,905 reads
2014-04-22
1,952 reads
2014-04-15
1,637 reads
If you have been in the information technology industry long enough, you have probably heard the expression "this adds overhead" when discussing any extra processing added on to what is considered normal processing. Dallas Snider answers the question of additional overhead caused by encryption.
2014-04-09
4,230 reads
2014-04-08
1,601 reads
K. Brian Kelly is trying to use SQL Server's built-in encryption and sees there are three different options available for an asymmetric key, corresponding to key length. What's the impact of the key length?
2013-08-12
3,228 reads
2013-07-26
1,709 reads
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
By Steve Jones
etherness – n. the wistful feeling of looking around a gathering of loved ones,...
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
Comments posted to this topic are about the item The Max PK Length
Comments posted to this topic are about the item My experience using the GitHub...
Comments posted to this topic are about the item The Microsoft SQL Year in...
If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?
See possible answers