External Article

Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security

In Part 2, we shift our focus to securing containerized deployments and cloud infrastructure. We will cover Kubernetes security hardening, real-time monitoring, infrastructure as code (IaC) security, and shifting security left to catch misconfigurations early. These strategies will help your team secure workloads in production and respond to potential threats before they lead to a security breach.

Blogs

T-SQL Tuesday #190–Mastering a New Technical Skill

By

It’s time for T-SQL Tuesday again and this time Todd Kleinhans has a great...

Getting Started with the MSSQL AI Agent in VS Code

By

Recently I was working in VS Code and I saw a walkthrough for the...

Summer Speaking Summary 2025

By

In the blink of an eye, summer has passed. I don’t know about you,...

Read the latest Blogs

Forums

Azure elastic query credential question

By cphite

I am trying to check out elastic query between two test instances we have...

Change Tracking Data Retention Options

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Change Tracking Data Retention Options

Requiring Technical Debt Payments

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Requiring Technical Debt Payments

Visit the forum

Question of the Day

Change Tracking Data Retention Options

If I am running this code:

ALTER DATABASE AdventureWorks2017 SET CHANGE_TRACKING = ON (CHANGE_RETENTION=4 xxx);
What are the possible choices for xxx?

See possible answers