Track Sensitive Data with SQL Server Extended Properties
A major priority in our industry today is protecting and tracking sensitive data. See how you can utilize SQL Server Extended Properties to do just that.
A major priority in our industry today is protecting and tracking sensitive data. See how you can utilize SQL Server Extended Properties to do just that.
Redgate’s SQL Monitor was named the most popular third-party monitoring tool in this year's State of SQL Server Monitoring Report. Find out exactly what SQL Monitor can save you and your company with the ROI calculator.
In this tip we look various map visualizations like Bubble, Shape and Filled Map visualizations you can use with Power BI.
With origins from the world of “Submarine ‘Dolphin’ Qualification” questions, an “Oolie” is a difficult question to answer, or the knowledge or fact needed to answer such a question, that may or may not pertain to one's duties but tests one's knowledge of a system or process to the limit. Introduction Contrary to what many […]
A phishing attack is directed at engineers, but it could easily be pointed at IT pros.
PolyBase has been around since 2016, but Microsoft is enhancing it in 2019 with the ability to connect to more data sources. You can now use PolyBase to connect to other SQL Server instances, and it’s easy to set up with a wizard. In this article Benjamin Weissman explains what’s new in PolyBase and walks you through setting it up and connecting to an external table.
Phil Factor illustrates the 'quirks' of the SQL_VARIANT datatype and why it's best to investigate when SQL Prompt alerts you to its use. It is only safe to store data as a SQL_VARIANT, if you explicitly convert it to its true type before you use it.
The ubiquity of databases and the potentially valuable information stored in them makes them attractive targets for people who want to steal data or harm its owner by tampering with it. Making sure that your data is secure is a critical part of configuring SQL Server and developing applications that use it to store data.
Over the last year we’ve seen a shift in customer concerns around personal data, as well as new legislation. Now is the time to implement a robust process to safeguard your data and your business, without hindering your DevOps journey. Read this blog post to find out the next steps for data privacy
One thing I’ve always loved about the Scooby-Doo cartoon is that he never solved...
By Kevin3NF
Flexibility and Scale at the Database Level When SQL Server 2012 introduced Availability Groups...
Setting page visibility and the active page are often overlooked last steps when publishing...
Comments posted to this topic are about the item Password Guidance
Comments posted to this topic are about the item Using table variables in T-SQL
I am trying to check out elastic query between two test instances we have...
What happens if you run the following code in SQL Server 2022+?
declare @t1 table (id int); insert into @t1 (id) values (NULL), (1), (2), (3); select count(*) from @t1 where @t1.id is distinct from NULL;See possible answers