Technical Article

Encrypting Without Secrets

Do you have a Web site or other system that deals in secrets of any sort? It seems like every time I give a security talk, people ask how to deal with the sticky problem of storing secrets. Connection strings with passwords are an obvious problem. You're better off simply using integrated security to get rid of those secrets, at least with SQL Server™, or an Oracle database. But what about credit card numbers and other financial or personal information? Can encryption help?

Technical Article

The CEO’s Guide to The Top 5 Issues that Misguide Business Intelligenc

When considering business intelligence (BI) software, it is essential to be aware of underlying issues that can seriously impact on your bottom line. In a country where most businesses have information stored in several different databases, it’s no secret that the BI strategy you choose will effect your profit and loss target. From data collection and integration to data analysis, the holy grail of Business Intelligence software combines your disparate databases to provide a decision support system that will enable you to make key conclusions using all of the available information.

SQLServerCentral Article

Brooke Philpott of sqlSentry

The guys that build software rarely get exposure of credit. Maybe that's why so many of them turn to open source where they get more well known. After a meeting at TechEd 2005, Andy Warren had the chance to get some interesting interview questions answered by Brooke Philpott, one of the 2 core developers of sqlSentry. And not a marketing guy.

External Article

SQL Server and MOM 2005

In this series of articles, you will learn the basics of installing Microsoft Operations Manager 2005 as well as how to use MOM to monitor SQL Server. This article takes advantage of virtualization. We will use VMware Workstation 5 to create the lab to introduce you to the basics of installing MOM to monitor SQL Server.

Blogs

AI: Blog a Day – Day 8: RAG – Retrieval Augmented Generation

By

RAG — Retrieval Augmented Generation. we have covered so far — embeddings, vectors, vector...

AI: Blog a Day – Day 7: Vector and Vector Databases

By

Continuing from Day 6 we learned Embeddings, Semantic Search and Checks, on Day 7...

AI: Blog a Day – Day 6: Embeddings – How AI Understands

By

Continuing from Day 5 where we covered notebooks, HuggingFace and fine tuning AI now...

Read the latest Blogs

Forums

Not Just an Upgrade

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Not Just an Upgrade

Restoring On Top I

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Restoring On Top I

Designing Delta Tables with Liquid Clustering: Real-World Patterns for Data Engineers

By mehul.bhuva@gmail.com

Comments posted to this topic are about the item Designing Delta Tables with Liquid...

Visit the forum

Question of the Day

Restoring On Top I

I am doing development work on a database and want to keep a backup so I can reset my database. I make some changes and want to restore over top of my changes. When I run this code, what happens?

USE Master
BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak'
GO

USE DNRTest
GO
CREATE TABLE MyTest(myid INT)
GO
USE master
RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACE

See possible answers