Loyalty Cards
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
Part two of his series on table schema changes, this article examines those changes that affect the actual data. Read this great article from Alok Dwivedi.
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
Full/partial schema refreshes across environments are a regular requirement in databases. This article builds on a previous article, providing scripts to disable and re-enable foreign key constraints on all of the tables in a schema.
In his previous article “Hyper-V, an introduction” Jaap Wesselius explained about the Hypervisor, the parent partition, the child partition, and Integration Components. In this article Jaap discusses installing Hyper-V, all kinds of Virtual Hard Disks, Virtual Networks, and some best practices.
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
By Steve Jones
I’m at the UK Redgate office today, meeting with senior leaders in all areas...
Optimizing Azure SQL Database performance often begins with identifying the most resource-intensive queries. Understanding...
By gbargsley
This is Week 2 of PowerShell Strikes Back – a four-week May series for...
Comments posted to this topic are about the item SSRS Is Dead. Here Are...
Comments posted to this topic are about the item The Distance Metric
Comments posted to this topic are about the item The New Wave of Security...
In the new VECTOR_DISTANCE() function in SQL Server 2025, the first parameter is the distance_metric. What is this?
See possible answers