Securing the Data Layer: Why SQL Developers Should Care About App-Level Vulnerabilities
Meta Description: App-level vulnerabilities can co...
Meta Description: App-level vulnerabilities can co...
Today Steve is asking if any of you use Standard Edition with the coming of a developer edition that matches it.
This is the first in a series of articles meant to provide practical solutions to common issues. In this post, we’ll talk about one of the most pervasive error messages out there:
This level will examine the most common problems and forms of mismanagement that lead to excessive growth of the transaction log.
A customer has a database that is already set up in a SQL Server Availability Group. Since this database hosts sensitive data, there is a need to encrypt the primary and all secondary replicas of the data. In this article, we will walk through how this can be done.
Swiping through LinkedIn feels like watching a campsite suddenly flooded with s’mores. Every other ad, i.e. post, promises the next miracle AI service, platform, or “AI-powered” widget. It’s a frenzy that says: “If buzzwords paid the bills, we’d all be billionaires already.” I can’t fault the reasoning, there’s a lot of buzz out there telling […]
Most evenings I spend some time soaking in the tub and reading articles/watching videos on InfoSec, Data Protection and AI. It may sound like a terrible way to spend some time, but I always find it educational and I’m in shock by the lack of concern around data security, and yet….I’m not. For decades, the […]
Agentic AI is often hailed as a game-changer by organizations, bringing autonomous decision-making, intelligent automation, and powerful predictive capabilities. However, as organizations rush to leverage these technologies, those dealing with critical data in relational databases, documents and datasets, especially personally identifiable information (PII) face a harsh reality: moving AI projects from proof-of-concept to production is […]
Every few weeks, headlines scream about how artificial intelligence is coming for our jobs. The narrative is often the same: white-collar professions are at risk, automation is taking over, and we’re all doomed to obsolescence.
By Vinay Thakur
RAG — Retrieval Augmented Generation. we have covered so far — embeddings, vectors, vector...
By Vinay Thakur
Continuing from Day 6 we learned Embeddings, Semantic Search and Checks, on Day 7...
By Vinay Thakur
Continuing from Day 5 where we covered notebooks, HuggingFace and fine tuning AI now...
Comments posted to this topic are about the item Not Just an Upgrade
Comments posted to this topic are about the item Restoring On Top I
Comments posted to this topic are about the item Designing Delta Tables with Liquid...
I am doing development work on a database and want to keep a backup so I can reset my database. I make some changes and want to restore over top of my changes. When I run this code, what happens?
USE Master BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO USE DNRTest GO CREATE TABLE MyTest(myid INT) GO USE master RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACESee possible answers