Virtualization, containers, and k8s

External Article

Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security

  • Article

In Part 2, we shift our focus to securing containerized deployments and cloud infrastructure. We will cover Kubernetes security hardening, real-time monitoring, infrastructure as code (IaC) security, and shifting security left to catch misconfigurations early. These strategies will help your team secure workloads in production and respond to potential threats before they lead to a security breach.

2025-05-19

SQLServerCentral Article

Using Containers to Avoid Installing SQL Server

  • Article

I got a new laptop recently and instead of installing SQL Server, I decided to try and use containers to see how well this works. This article looks at how I got this working relatively quickly. The short list of things I did is: Install Docker Desktop Create a location for data/logs/etc. Create a docker-compose […]

5 (2)

You rated this post out of 5. Change rating

2024-09-06

5,558 reads

Blogs

T-SQL Tuesday #191: Invitation–Your Favorite String Parsing

By

It’s that time of the month, and I’m late. My apologies. I had a...

Fabric as a Data Mesh Enabler: Rethinking Enterprise Data Distribution

By

For decades, enterprises have approached data management with the same mindset as someone stuffing...

Truncate Table Pitfalls

By

 Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....

Read the latest Blogs

Forums

Technological Dinosaurs or Social Dinosaurs?

By Grant Fritchey

Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?

DBCC CHECKIDENT

By Steve Jones - SSC Editor

Comments posted to this topic are about the item DBCC CHECKIDENT

Distributed Availability Group Health: T-SQL and Zabbix

By Pablo Echeverria

Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...

Visit the forum

Question of the Day

DBCC CHECKIDENT

What is returned as a result set when I run this command without a new seed value?

See possible answers