2023-10-14
73 reads
2023-10-14
73 reads
What are the Power BI workspace permissions and roles and how are they used?
2023-10-06
DevOps is great, but Steve thinks we need to ensure we include security is a part of what we do when building and deploying software.
2023-10-02
107 reads
Can you trust your colleagues? We all want to, but there are always temptations, especially when life gets hard. Steve wonders today how we look at the issues of security inside of our organizations.
2023-09-06
108 reads
2023-08-25
480 reads
2023-08-02
389 reads
2023-07-26
497 reads
Microsoft is recommending more security for SQL Servers, including dev and test instances. Do you agree this is a good idea? Would you implement this?
2023-06-28
188 reads
In this article, learn how to control access levels to various data and parts of Power BI reports using row-level security as well as column and object-level security.
2024-01-09 (first published: 2023-06-19)
2023-05-29
299 reads
By Steve Jones
feresy – n. the fear that your partner is changing in ways you don’t...
This article provides a comprehensive overview of the ORDER BY clause within SQL window...
Want to build a data analytics foundation that transforms raw data into valuable business...
Comments posted to this topic are about the item The Cloud Security Problem, which...
Hi, I have a simple table with 5 columns as follows with about 80,000...
hi everyone I have a SP that is run in SSIS. That particular SP...