Virtualization, containers, and k8s

External Article

Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security

  • Article

In Part 2, we shift our focus to securing containerized deployments and cloud infrastructure. We will cover Kubernetes security hardening, real-time monitoring, infrastructure as code (IaC) security, and shifting security left to catch misconfigurations early. These strategies will help your team secure workloads in production and respond to potential threats before they lead to a security breach.

2025-05-19

SQLServerCentral Article

Using Containers to Avoid Installing SQL Server

  • Article

I got a new laptop recently and instead of installing SQL Server, I decided to try and use containers to see how well this works. This article looks at how I got this working relatively quickly. The short list of things I did is: Install Docker Desktop Create a location for data/logs/etc. Create a docker-compose […]

5 (2)

You rated this post out of 5. Change rating

2024-09-06

5,754 reads

Blogs

A New Word: Foilsick

By

foilsick – adj. feeling ashamed after revealing a little too much of yourself to...

Accelerated Database Recovery for tempdb in SQL Server 2025

By

Accelerated database recovery was introduced in SQL Server 2019 and provides fast recovery, instantaneous...

Measuring What Matters: Operationalizing Data Trust for CDOs

By

Trust is the currency of the data economy. Without it, even the most advanced...

Read the latest Blogs

Forums

Create an HTML Report on the Status of SQL Server Agent Jobs

By Nisarg Upadhyay

Comments posted to this topic are about the item Create an HTML Report on...

count the number of NULLs in a row

By water490

Hi everyone I have a SP that finds the average based on 3 tables. ...

Deleting data in large table

By Jackie Lowery

I have a large table with 17M+ rows for our package record audits.  I've...

Visit the forum

Question of the Day

SQL Server Ghosts

For Halloween, what are ghost records?

See possible answers