2025-01-04
97 reads
2025-01-04
97 reads
Like ancient Gaul, SQL is divided into three sub- languages. The DDL (Data Declaration Language) declares the data. This is where we find the data types, constraints, references and other structures that have to do with how the data stored . The DML (Data Manipulation Language) uses those declarations to change their contents or to invoke them. It does not change structures and schema objects.
2024-12-04
Are your developers working with live production data, completely made-up synthetic data, or something in between? I posted a poll here on the blog and on a few of my social media feeds, and here were the results:
2024-11-06
If you encounter Django in your environment, are you thinking about SQL Injection and security? If not, read this article and learn how to protect your data.
2024-11-01
1,026 reads
Cloud security can be better than on-premises, but it requires work and knowledge.
2024-10-30
119 reads
Governments want backdoors built into encryption software, which Steve thinks is a bad idea.
2024-09-23
111 reads
Learn about object-level, column-level, and row-level security in Microsoft Fabric Warehouse and how this can be implemented to limit access to data.
2024-08-28
SQL Injection continues to be a problem and Steve has a few thoughts today on how to reduce your vulnerabilities.
2024-08-14
227 reads
I remember going to the theater over the Thanksgiving holiday in 1987 and seeing Planes, Trains, and Automobiles with Steve Martin and John Candy. My family didn’t often take in the holiday weekend movie releases, but Steve was a family favorite actor already, and friends had given it a good review. Having watched it just […]
2024-07-20
176 reads
Steve wonders how well most organizations and their staff adhere to the principle of least privilege.
2024-07-15
181 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
Hi, our peer who owns a remote mysql server from which we extract warehouse...
What is returned as a result set when I run this command without a new seed value?
See possible answers