2018-11-05
854 reads
2018-11-05
854 reads
2018-10-25
622 reads
2018-10-22
911 reads
Security, compliance, and data ethics are related concepts that everyone who works with software should know about, from the help desk to the C-level office… but almost everyone thinks that worrying about these things is someone else’s problem.
2018-09-27
3,563 reads
2018-07-17
786 reads
Learn which permissions are required to drop a database and see a test to show that these apply.
2018-07-17
22,346 reads
Data breaches make the news on an almost daily basis. There is no turning back, however, as we are firmly entrenched in this digital way of life. Brian Kelley discusses some of the reasons data breaches occur and what we can do to prevent them.
2018-06-26
3,121 reads
What is FIPS? How do I use it? What is going to break if I do use it?
2018-06-25
7,240 reads
When analyzing security-related challenges, it is important to note that they encompass several distinct but interrelated technologies. In addition, when dealing with data services, it is also necessary to distinguish between the data plane, facilitating access to the underlying content and the management plane, which allows for delegation of administrative tasks. In this article, Marcin Policht explores how these concepts apply to the Azure Cosmos DB offering.
2018-06-05
2,582 reads
2018-03-30
833 reads
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Comments posted to this topic are about the item We Are Eating Our Own...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers