2019-12-30
593 reads
2019-12-30
593 reads
2019-12-23
723 reads
Today Steve looks at a research project from Microsoft that provides some better protection from firmware security issues.
2019-12-17
156 reads
Learn how you can query information in the logical server's master database from an Azure SQL Database.
2019-12-12
5,869 reads
The Microsoft Threat Intelligence Center actively works to track the world's hackers and help warn us when we become the object of their attacks.
2019-12-09
163 reads
2019-12-06
744 reads
2019-11-29
608 reads
The Azure Sphere project is a great piece of research at Microsoft that might help us data professionals with security.
2019-11-25
208 reads
Losing the security game is no fun when data is involved. Steve points out some things you should be doing.
2019-10-21
257 reads
The rise of attacks is something Steve thinks will trigger more network protection, something data professionals will need to work with.
2019-10-17
183 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
What is returned as a result set when I run this command without a new seed value?
See possible answers