Watching the Watchers
This editorial was originally published on Jan 16, 2007. It is being republished today as Steve is on vacation. This one looks at the potential issues with data mining when data might be shared between companies.
This editorial was originally published on Jan 16, 2007. It is being republished today as Steve is on vacation. This one looks at the potential issues with data mining when data might be shared between companies.
Learn how to configure Azure SQL Database and setup the AdventureWorks database for code testing and learn how to use features of SQL Server.
From castles and dragons to swordfights and spells, this year’s SQL Bits will have it all. Make sure you don’t miss out on our great sessions, from Code Errors to Reliable Releases, to adding some PostgreSQL skills to your repertoire. Come and say hi to us at the Redgate booth! Get 10% off registering with 10REDGATE.
I honestly enjoy writing editorials. Something pops into my tiny brain next to something else, and I'm off. However, today, as I started to write on the topic of learning, I suddenly felt like I had just written this same editorial. I go and look, sure enough, several of my recent editorials have been on […]
Steve thinks the world is close to normal for him after the pandemic. What about you?
Learn how you can use CI/CD with your ADF Pipelines and Azure DevOps using ARM templates.
Missed our recent webinar on ‘Monitoring: The ROI of Build vs Buy’? Catch up on demand and find out the pros and cons to building a monitoring system versus purchasing one. Watch now!
Learn about the SELECT DISTINCT SQL command to return a unique list of values from SELECT queries along with several examples.
Not only is the security of our organization important, but that of our partners matters as well.
By defining server- and database-level audits, you can record just about any kind of event that occurs in SQL Server, which can be an invaluable source of security troubleshooting and forensic information when security breaches occur. In this stairway level you’ll learn how to define the various audit specification objects, how to capture audit data, and how to explore and use the data.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item Dancing Robot Goes Rogue
Hi , i installed winscp on my pc, added it to GAC thru vs...
Comments posted to this topic are about the item Identities and Sequences II
In thinking about the differences between the identity property and a sequence object, which of these two guarantees that there are consecutive numbers (according to the increment) inserted in a single table?
See possible answers