Loyalty Cards
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
Part two of his series on table schema changes, this article examines those changes that affect the actual data. Read this great article from Alok Dwivedi.
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
Full/partial schema refreshes across environments are a regular requirement in databases. This article builds on a previous article, providing scripts to disable and re-enable foreign key constraints on all of the tables in a schema.
In his previous article “Hyper-V, an introduction” Jaap Wesselius explained about the Hypervisor, the parent partition, the child partition, and Integration Components. In this article Jaap discusses installing Hyper-V, all kinds of Virtual Hard Disks, Virtual Networks, and some best practices.
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
Is it better to build an API into your code and allow someone to "plug in" or provide them with source code? Steve Jones thinks the former is better and gives you a few reasons why.
By Steve Jones
We have multiple teams (8) working on Redgate Monitor. Some work on the Standard...
By HeyMo0sh
Learning any kind of theory is easy, but adapting FinOps and watching it rescue...
By Vinay Thakur
As discussed introduction of Always Encryption blog and initial Encryption at rest as TDE...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item The Problem Isn't Always Your...
Comments posted to this topic are about the item Identity Defaults
What happens when I run this code?
CREATE TABLE dbo.IdentityTest
(
id int IDENTITY(10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
See possible answers