2014-11-13
2,107 reads
2014-11-13
2,107 reads
Arshad Ali demonstrates granular level encryption in detail and explains how it differs from Transparent Data Encryption (TDE).
2014-07-04
6,349 reads
This article details encrypted backups and how they are implemented in SQL Server 2014.
2014-05-15
5,097 reads
A short piece that gives you the basics of how to administer the database master keys that form the basis for encryption inside of your databases.
2014-05-12
12,864 reads
2014-04-22
1,951 reads
2014-04-15
1,635 reads
If you have been in the information technology industry long enough, you have probably heard the expression "this adds overhead" when discussing any extra processing added on to what is considered normal processing. Dallas Snider answers the question of additional overhead caused by encryption.
2014-04-09
4,230 reads
2014-04-08
1,599 reads
K. Brian Kelly is trying to use SQL Server's built-in encryption and sees there are three different options available for an asymmetric key, corresponding to key length. What's the impact of the key length?
2013-08-12
3,228 reads
2013-07-26
1,706 reads
By Steve Jones
Train employees well enough that they could get another job but treat them well...
By Steve Jones
I needed to test a striped backup, so I decided to ask the AI’s...
By Kevin3NF
It’s Not Just Backup / Restore At some point every company faces it: the...
Comments posted to this topic are about the item Create an HTML Report on...
Comments posted to this topic are about the item Why Data Modelling Still Matters...
Hi when i think of server hops , i think of how kerberos assists...
When I run this code, how many rows are returned?
DECLARE @meals NVARCHAR(1000) = N'夕食昼食朝食' DECLARE @s NVARCHAR(1) = N'食' SELECT value FROM STRING_SPLIT(@meals, @s) GOSee possible answers