2021-06-07
564 reads
2021-06-07
564 reads
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Keeping databases secure is critical. In this article, Robert Sheldon explains what to monitor for SQL Server security.
2021-04-16
2021-04-12
511 reads
2021-04-09
496 reads
You need to make sure that nobody tampers with your production databases, or really any databases outside Development. Even if you weren't of a nervous disposition, you'd want to know if a database was stopped or removed. You'd also be intrigued by the sudden unrehearsed addition of a database to a production server.
2020-02-14
In this article we look at the steps you can follow to create a secure and locked down instance of SQL Server to only be used by the intended application on the same machine.
2020-01-07
2019-12-13
629 reads
SQL Server has many tools used to make it secure. In this article, Robert Sheldon demonstrates several of these features including SQL Server Configuration Manager and the Vulnerability Assessment tool.
2019-06-03
SQL Server has many tools used to make it secure. In this article, Robert Sheldon demonstrates several of these features including SQL Server Configuration Manager and the Vulnerability Assessment tool.
2019-05-31
By Vinay Thakur
Continuing from Day 5 where we covered notebooks, HuggingFace and fine tuning AI now...
By Steve Jones
This is kind of a funny page to look at. The next page has...
A while ago I blogged about a use case where a pipeline fails during...
I have a table I didn't design that has tons of repeating groups in...
Comments posted to this topic are about the item Writing as an Art and...
Comments posted to this topic are about the item String Similarity II
What is the range for the result from the EDIT_DISTANCE_SIMILARITY() function in SQL Server 2025?
See possible answers