Searching an Encrypted Column
This article examines the challenges with searches on encrypted data and presents a possible solution that you might use to speed up those queries.
2023-12-15
2,157 reads
This article examines the challenges with searches on encrypted data and presents a possible solution that you might use to speed up those queries.
2023-12-15
2,157 reads
Fingerprint readers on laptops are shown not to be as secure as they could be, and primarily because the manufacturers haven't done a good job implementing the secure protocols.
2023-12-11
160 reads
Today Steve discusses an aspect of AI that many people are concerned about: data security. Read more and think about how this might affect your organization.
2023-11-27
254 reads
In this second part of the Q&A with Dustin Dorsey, we asked him about how to get buy-in from security teams who are cautious by nature, how to encourage the wider IT team to accept their recommendations, and what additional challenges highly regulated sectors like healthcare and finance face.
2023-11-17
While the cloud is recognized as more secure than on-premises servers and infrastructures, it does come with the often talked about shared responsibility model. Cloud providers are responsible for security ‘of’ the cloud, while their clients are responsible for security ‘in’ the cloud. Find out more in this Q&A with Dustin Dorsey
2023-11-13
Another company has hard-coded credentials, which Steve feels are a sign of bad culture.
2023-10-23
138 reads
Steve has had to change his security, which is good, but annoying.
2023-10-18
161 reads
2023-10-14
88 reads
What are the Power BI workspace permissions and roles and how are they used?
2023-10-06
DevOps is great, but Steve thinks we need to ensure we include security is a part of what we do when building and deploying software.
2023-10-02
135 reads
By Steve Jones
Superheroes and saints never make art. Only imperfect beings can make art because art...
One feature that I have been waiting for years! The new announcement around optimize...
Following on from my last post about Getting Started With KubeVirt & SQL Server,...
Comments posted to this topic are about the item The AI Bubble and the...
Hi, in a simple oledb source->derived column->oledb destination data flow, 2 of my...
hi, i noticed the sqlhealth extended event is on by default , and it...
I am currently working with Sql Server 2022 and AdventureWorks database. First of all, let's set the "Read Committed Snapshot" to ON:
use master; go alter database AdventureWorks set read_committed_snapshot on with no_wait; goThen, from Session 1, I execute the following code:
--Session 1 use AdventureWorks; go create table ##t1 (id int, f1 varchar(10)); go insert into ##t1 values (1, 'A');From another session, called Session 2, I open a transaction and execute the following update:
--Session 2 use AdventureWorks; go begin tran; update ##t1 set f1 = 'B' where id = 1;Now, going back to Session 1, what happens if I execute this statement?
--Session 1 select f1 from ##t1 where id = 1;See possible answers