External Article

Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security

In Part 2, we shift our focus to securing containerized deployments and cloud infrastructure. We will cover Kubernetes security hardening, real-time monitoring, infrastructure as code (IaC) security, and shifting security left to catch misconfigurations early. These strategies will help your team secure workloads in production and respond to potential threats before they lead to a security breach.

SQLServerCentral Editorial

Shining a Light on Shadow AI - Responsible Data Protection When AI is Everywhere

As someone who has had the honor of delivering keynotes at both Oracle and SQL Saturday data events, I’ve spent time with professionals on both sides of the database world.  I’ve held the title of database administrator, developer, engineer and architect for structured, transactional giants and the analytics-heavy ecosystems of eight different database platforms, (not […]

Blogs

Finding Balance: Things Will Come Up

By

I have a presentation on finding balance in your career that got quite a...

Who Are You Doing It For?

By

But as I've matured over the years, I came to realize that I needed...

Presenting Twice in May 2026

By

I will be presenting my latest session, Documenting Your Work for Worry-Free Vacations, in-person...

Read the latest Blogs

Forums

How to change the FDLaunch Error log file location

By schleep

The file FDLAUNCHERRORLOG gets created in the default <instance>\MSSQL\Log folder. So far, I've found...

what data type i should use for roversion col and can i use less than greater

By rajemessage 14195

can i use Rowversioncol ( in my database it's synonyme timestamp is used) to...

Radius Latitude Longitude

By HeftSteady

I have a table with latitude longitude in the format.  45.123456 , -111.123456 ,...

Visit the forum

Question of the Day

A Fun Computer Quote

Which movie featured this quote?

"All programs have a desire to be useful."
Happy April Fools!

See possible answers