SQL Server Column Level Encryption Example using Symmetric Keys
With data stored in tables, you have a few options to protect data. Check out this tip to learn more about column level encryption.
With data stored in tables, you have a few options to protect data. Check out this tip to learn more about column level encryption.
Instagram has a complex architecture for it's technology infrastructure. The people that work there have to be jacks of all trades. Is that the type of environment you'd like to work in?
Learn to simplify date logic using date tables and recursion in T-SQL with this article from David Beardsley.
A table that does not have a clustered index is referred to as a Heap. While a lot has been written about index fragmentation and how to defrag indexes, there is not much that talks about how to defrag a heap table.
It's easy to create a database nowadays with point-'n-click, but if you've left your database's autogrowth settings at their default, you may hit problems in the future. Why? What do I do about it? Read on!
Voting is now open to choose the sessions you would like to see at the SQLBits Community Day on 31st March, 2012.
This article demonstrates basic C# code that will enable SSIS package developers to write useful custom SSIS script tasks.
With the amount of data being stored expanding exponentially, does the role of the DBA need to change from caretaker to interpreter?
Encryption is supposed to protect data, and it appears to be working as police and authorities are often stymied by encrypted disks. Steve Jones recommends you encrypt your disks on all your machines.
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Comments posted to this topic are about the item We Are Eating Our Own...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers