2023-08-02
395 reads
2023-08-02
395 reads
2023-07-26
503 reads
Microsoft is recommending more security for SQL Servers, including dev and test instances. Do you agree this is a good idea? Would you implement this?
2023-06-28
199 reads
In this article, learn how to control access levels to various data and parts of Power BI reports using row-level security as well as column and object-level security.
2024-01-09 (first published: 2023-06-19)
2023-05-29
307 reads
Steve notes that password expiration is important for SQL Logins, but he knows this isn't always configured when logins are created, or checked later to see if it is still enabled.
2023-05-27
553 reads
This article looks at four security best practices for protecting databases in AWS along with how GuardDuty can be used to provide additional security.
2023-05-17
1,362 reads
The way the public thinks about security issues isn't always accurate, but we have to accept that and learn to respond in a professional manner.
2023-05-03
117 reads
This article looks at security mechanisms in the cloud that can help protect your data, with specific examples in AWS.
2023-04-14
1,395 reads
Not only is the security of our organization important, but that of our partners matters as well.
2023-03-08
135 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
Hi, our peer who owns a remote mysql server from which we extract warehouse...
What is returned as a result set when I run this command without a new seed value?
See possible answers