Secure Storage
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
A week or so ago I posted a note about reading How to Start a Conversation and Make Friends (worth reading), and I had a comment posted to the blog by author Don Gabor. I like that kind of follow up, so I sent Don a note and a ...
Fast analysis, better insight and rapid deployment with minimal IT involvement: these are among the benefits of in-memory analytics, but different products are appropriate for different environments. Read our in-depth report on in-memory technologies.
A licensing scheme from Embarcadero catches Steve Jones' eye. He comments on a great way for the company to work with customers.
This week Steve Jones discusses ethics and leadership in IT.
I was a running a routine query using an equal operator on the only column of the primary key for a table and I noticed that the performance was terrible. These queries should have been flying because all I was doing was retrieving one row of data which should have been doing an index seek. When I looked at the query plan it was doing a scan instead. This tip shows you what I found and how to resolve the problem.
In the course of giving my security presentations over the past year, I've learned that quite a few folks have never seen the C-I-A triad before. The C-I-A triad stands for...
Clustering is often the first choice for high availability, but is it the best choice? A lot of people think so, but Steve Jones has other thoughts.
Clustering is often the first choice for high availability, but is it the best choice? A lot of people think so, but Steve Jones has other thoughts.
By Vinay Thakur
As discussed introduction of Always Encryption blog and initial Encryption at rest as TDE...
By Vinay Thakur
Transparent Data Encryption(TDE): TDE was initially introduced in SQL Server 2008 Enterprise Edition; this...
By Steve Jones
Only a little break for me. I’m actually heading to Las Vegas today for ...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item The Problem Isn't Always Your...
Comments posted to this topic are about the item Identity Defaults
What happens when I run this code?
CREATE TABLE dbo.IdentityTest
(
id int IDENTITY(10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
See possible answers