2022-09-12
514 reads
2022-09-12
514 reads
Learn how to find all securable objects in SQL Server and the permissions for each securable object using the system function fn_builtin_permissions.
2022-08-31
DevOps is often thought of as bringing more features to customers, but it can also help security.
2022-08-15
132 reads
In this article, we look at how to mask/hide data for users using Dynamic Data Masking in SQL Server and Data Redaction in Oracle
2022-08-08
Learn how to more easily manage permissions in the Power BI service using PowerShell.
2022-06-06
3,184 reads
2022-05-25
488 reads
SQL Server has many features to keep the database secure, but you must implement them to benefit. In this article, Priyanka Chouhan describes how to do a vulnerability assessment of SQL Server.
2022-05-18
Project Zero from Google aims to study zero day vulnerabilities. Steve hopes it leads to better security.
2022-05-04
100 reads
2022-04-22
468 reads
Having a known and documented incident response plan is important these days, as more and more companies are having security incidents.
2022-04-06
128 reads
By Vinay Thakur
Continuing from Day 5 where we covered notebooks, HuggingFace and fine tuning AI now...
By Steve Jones
This is kind of a funny page to look at. The next page has...
A while ago I blogged about a use case where a pipeline fails during...
I have a table I didn't design that has tons of repeating groups in...
Comments posted to this topic are about the item Writing as an Art and...
Comments posted to this topic are about the item String Similarity II
What is the range for the result from the EDIT_DISTANCE_SIMILARITY() function in SQL Server 2025?
See possible answers