2019-08-19
205 reads
2019-08-19
205 reads
A phishing attack is directed at engineers, but it could easily be pointed at IT pros.
2019-08-08
192 reads
2019-08-07
380 reads
Users cause lots of security issues, and we ought to try to work within that framework, with the understanding the we can't prevent all problems.
2019-08-01
205 reads
Ransomware is becoming a bigger and bigger problem. Steve has some thoughts on how you should think about security in your database environment.
2019-07-15
349 reads
Learn how we can generate tokens that will give access to resources inside Azure without actually adding new users to your domain.
2019-07-01
2,665 reads
This week we have a few back to the basics security comments from Steve.
2019-06-25
436 reads
2019-06-18
922 reads
Computer network security is important, and it's something we ought to be more concerned with as data professionals.
2025-06-30 (first published: 2019-06-18)
358 reads
2019-06-12
869 reads
By Brian Kelley
If you want to learn better, pause more in your learning to intentionally review.
By John
If you’ve used Azure SQL Managed Instance General Purpose, you know the drill: to...
By DataOnWheels
Ramblings of a retired data architect Let me start by saying that I have...
Not sure if this is really a relational theory question but it seems about...
Hi everyone, Below is a consolidated summary of what we validated Architecture & data...
Hi all, I recently moved to a new employer who have their HA setup...
I have this data in a SQL Server 2025 table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers