Security Considerations for ERP Applications
Security is, or at least should be, the priority for any IT system. In this article, Cynthia Dzikiti discusses the security aspects of ERP systems and some of the techniques used to protect data.
Security is, or at least should be, the priority for any IT system. In this article, Cynthia Dzikiti discusses the security aspects of ERP systems and some of the techniques used to protect data.
More and more data is being captured and analyzed all the time. At the same time, there are varying expectations of privacy that aren't always shared between the subjects of data and the collectors. Steve has a few thoughts on how this will play out for data professionals.
This week, Brent is demoing SQL Server 2019 features that he's really excited about, and they all center around a theme we all know and love: parameter sniffing.
Louis Davidson reveals some useful Prompt features for refactoring individual code blocks or modules during development, which will improve code quality, reduce tedium, make testing simpler, or sometimes all three.
Kathi Kellenberger introduces the new Estate monitoring pages in SQL Monitor 9, and explains how they will help DBAs monitor and safeguard the security, stability and availability of all servers in their care.
Steve is putting on a new contest for you with some fun prizes. Put on your creative hat and submit an entry. Contest ends April 21, 2019.
Last year I started to get alerts from Microsoft Repos that someone had put a piece of security information in their code that pertained to one of my Azure services. At first I was worried, but then I realized this was the public version of AdventureWorks we maintain in Azure. We've published the login so […]
Kendra Little shows how to get the WideWorldImporters database into version control, using SQL Source Control, and then set up an automated database build process, using Azure DevOps with SQL Change Automation.
Template-based provisioning simplifies deployment and promotes principles of DevOps and Infrastructure as Code, making it the recommended method for implementing cloud-based services. However, its benefits extend beyond initial implementation, since you can apply it to configuring and maintaining existing Azure SQL Database instances. In this article, you explore an example of this approach.
A monitoring tool must provide us with an understanding of the often-complex performance patterns that databases exhibit when under load, so that we can predict how they will cope with expansion or increase in scale. It must also helps us spot the symptoms of stress and act before they become problems that affect the service, and understand better what was happening within a database when an intermittent problem started.
By John
Failing to plan is planning to fail. When organizations first begin implementing Azure networking,...
By Steve Jones
As I use containers more and more to run various things, I decided I...
By Kevin3NF
Old Reliable Still Matters If you’ve been around SQL Server for a while, you’ve...
I maintain an application written years ago, where the database is on a Windows...
I’m working on a jewelry e-commerce project and need advice on designing an efficient...
Comments posted to this topic are about the item The Duplicate Cursor
Can I run this code:
DECLARE ANewTable CURSOR FOR SELECT * FROM ANewTableSee possible answers