External Article

Practical steps for end-to-end data protection

If you plan to make production data available for development and test purposes, you'll need to understand which columns contain personal or sensitive data, create a data catalog to record those decisions, devise and implement a data masking, and then provision the sanitized database copies. Richard Macaskill show how to automate as much of this process as possible.

Blogs

Overcoming Imposter Syndrome: A Plan

By

My most recent bout with imposter syndrome was with ISACA’s Digital Trust Ecosystem Framework...

Advice I Like: Celebrate Success

By

“On the way to a grand goal, celebrate the smallest victories as if each...

Programmatically Retrieving MLV Lineage and Refresh Times

By

Materialized lake views (MLVs) in Microsoft Fabric are an effective way to implement medallion...

Read the latest Blogs

Forums

BCA KCP Kepa Duri,Telp/Wa 0821.3111.159

By alivenje

Jl. Mangga Raya No.20, Duri Kepa, Kec. Kb. Jeruk, Kota Jakarta Barat, Daerah Khusus...

BCA Finance WTC Mangga Dua Tlpn/wa:085373737551

By innosys

Gedung WTC Jl. Mangga Dua Raya. 8 Lantai 6, Blok CL 001, RT.CL, Jl....

BCA KCP Kebon Jeruk,Telp/Wa 0821.3111.159

By alivenje

Komp, Jl. Taman Kb. Jeruk Jl. Meruya Ilir Raya No.Blok B 6, RT.1/RW.9, Srengseng,...

Visit the forum

Question of the Day

Increase Deadlock Detection

How can I alter the deadlock detection interval to 2 seconds instead of 5 seconds on my SQL Server 2025 instance?

See possible answers