Secure Storage
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
A week or so ago I posted a note about reading How to Start a Conversation and Make Friends (worth reading), and I had a comment posted to the blog by author Don Gabor. I like that kind of follow up, so I sent Don a note and a ...
Fast analysis, better insight and rapid deployment with minimal IT involvement: these are among the benefits of in-memory analytics, but different products are appropriate for different environments. Read our in-depth report on in-memory technologies.
A licensing scheme from Embarcadero catches Steve Jones' eye. He comments on a great way for the company to work with customers.
This week Steve Jones discusses ethics and leadership in IT.
I was a running a routine query using an equal operator on the only column of the primary key for a table and I noticed that the performance was terrible. These queries should have been flying because all I was doing was retrieving one row of data which should have been doing an index seek. When I looked at the query plan it was doing a scan instead. This tip shows you what I found and how to resolve the problem.
In the course of giving my security presentations over the past year, I've learned that quite a few folks have never seen the C-I-A triad before. The C-I-A triad stands for...
Clustering is often the first choice for high availability, but is it the best choice? A lot of people think so, but Steve Jones has other thoughts.
Clustering is often the first choice for high availability, but is it the best choice? A lot of people think so, but Steve Jones has other thoughts.
By Steve Jones
ecstatic shock – n. a surge of energy upon catching a glimpse from someone...
By Chris Yates
The New Arena of Leadership The role of the Chief Data Officer is no...
Presenting you with an updated version of our sp_snapshot procedure, allowing you to easily...
Email..dmtworld2@gmail.com Telegram..@jemsscott237 Vaping DMT makes it considerably more advantageous when contrasted with really illuminating...
Comments posted to this topic are about the item Lessons from the Postmark-MCP Backdoor
Just saw the "Azure Extension for SQL Server" Does anyone has experience with it?...
I have a table with this data:
TravelLogID CityID StartDate EndDate 1 1 2025-01-01 2025-01-06 2 2 2025-01-01 2025-01-06 3 3 2025-01-01 2025-01-06 4 4 2025-01-01 2025-01-06 5 5 2025-01-01 2025-01-06I run this code:
SELECT IDENT_CURRENT('TravelLog')I get the value 5 back. Now I do this:
SET IDENTITY_INSERT dbo.TravelLog ON INSERT dbo.TravelLog ( TravelLogID, CityID, StartDate, EndDate ) VALUES (25, 5, '2025-09-12', '2025-09-17') SET IDENTITY_INSERT dbo.TravelLog OFFI now run this code.
DBCC CHECKIDENT(TravelLog) GO INSERT dbo.TravelLog ( CityID, StartDate, EndDate ) VALUES (4, '2025-10-14', '2025-10-17') GOWhat is the value for TravelLogID for the row I inserted for CityID 4 and dates starting on 14 Oct 2025? See possible answers