Secure Storage
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
How do you keep the passwords and keys for encrypted data safe? Steve Jones comments on the challenges of working with keys and passwords.
A week or so ago I posted a note about reading How to Start a Conversation and Make Friends (worth reading), and I had a comment posted to the blog by author Don Gabor. I like that kind of follow up, so I sent Don a note and a ...
Fast analysis, better insight and rapid deployment with minimal IT involvement: these are among the benefits of in-memory analytics, but different products are appropriate for different environments. Read our in-depth report on in-memory technologies.
A licensing scheme from Embarcadero catches Steve Jones' eye. He comments on a great way for the company to work with customers.
This week Steve Jones discusses ethics and leadership in IT.
I was a running a routine query using an equal operator on the only column of the primary key for a table and I noticed that the performance was terrible. These queries should have been flying because all I was doing was retrieving one row of data which should have been doing an index seek. When I looked at the query plan it was doing a scan instead. This tip shows you what I found and how to resolve the problem.
In the course of giving my security presentations over the past year, I've learned that quite a few folks have never seen the C-I-A triad before. The C-I-A triad stands for...
Clustering is often the first choice for high availability, but is it the best choice? A lot of people think so, but Steve Jones has other thoughts.
Clustering is often the first choice for high availability, but is it the best choice? A lot of people think so, but Steve Jones has other thoughts.
It's time for T-SQL Tuesday #198! This month's topic is change detection. The post T-SQL...
By James Serra
Model Context Protocol, or MCP, is one of those technical ideas that sounds more...
When starting with AWS RDS Aurora for managing relational databases in the cloud, many...
Jl. Ahmad Yani No.9, RT.01/RW.05, Marga Jaya, Kec. Bekasi Sel., Kota Bks, Jawa Barat...
Jl. DR. Cipto Mangunkusumo No.4E, Pekiringan, Kec. Kesambi, Kota Cirebon, Jawa Barat 45131
BCA KCU SUNTER HUB.Tlpn.0821•3111•185 Jl. Danau Sunter Utara Jalan Kavling No.3 Blok A, RT.2/RW.18,...
In honor of May the fourth and Star Wars (may the force be with you), finish this quote:
"Do, or do not. ..."See possible answers