In Part 2, we shift our focus to securing containerized deployments and cloud infrastructure. We will cover Kubernetes security hardening, real-time monitoring, infrastructure as code (IaC) security, and shifting security left to catch misconfigurations early. These strategies will help your team secure workloads in production and respond to potential threats before they lead to a security breach.
As someone who has had the honor of delivering keynotes at both Oracle and SQL Saturday data events, I’ve spent time with professionals on both sides of the database world. I’ve held the title of database administrator, developer, engineer and architect for structured, transactional giants and the analytics-heavy ecosystems of eight different database platforms, (not […]
Steve examines the idea that we might all have a data breach at some point.
Learn how to safely remove a SQL Server .ndf data file without any downtime using DBCC SHRINKFILE (EMPTYFILE). This hands-on tutorial walks through real-world Azure-based setup, data redistribution, and storage cleanup — ideal for DBAs managing enterprise SQL Server environments.
The ASCII function is used to return the ASCII value for the first character in a string.
Microsoft talks about evergreen SQL, where you never need to patch your database.
In order to make it easier to understand truncation, space reuse and fragmentation in the log file, Tony gives a brief explanation of how the transaction log works.
First things first: pick up that filthy keyboard, take it over to the trash can, turn it upside down, and give it a good, vigorous shake.
See how ChatGPT can be used to analyze a dataset, produce charts, and train a model.
Setting page visibility and the active page are often overlooked last steps when publishing...
By Steve Jones
It’s time for T-SQL Tuesday again and this time Todd Kleinhans has a great...
By Steve Jones
Recently I was working in VS Code and I saw a walkthrough for the...
Comments posted to this topic are about the item Password Guidance
Comments posted to this topic are about the item Using table variables in T-SQL
I am trying to check out elastic query between two test instances we have...
What happens if you run the following code in SQL Server 2022+?
declare @t1 table (id int); insert into @t1 (id) values (NULL), (1), (2), (3); select count(*) from @t1 where @t1.id is distinct from NULL;See possible answers