In this tip we look at different things you should consider when developing your database systems to ensure you are also thinking about security best practices as well.
Learn how to use Biml to create a SSIS-package with a Script component that can read from Twitter.
This article was co-authored by Dimitri Furman and Denzil Ribeiro Reviewed by: Danimir Ljepava, Borko Novakovic, Jovan Popovic, Rajesh Setlem, Mike Weiner Introduction In our ongoing engagements with the SQL DB Managed Instance preview customers a common requirement has been to monitor database workload performance in real time.
In this tip we learn how to update the Azure SQL Data Mart in an automated way.
Learn how containers and WinDocks can be used to quickly provision copies of databases.
DBAs running SQL Server on Linux will not only need to understand SQL Server security well, they will also need to understand how security works on Linux. In this article, Kellyn Pot'Vin-Gorman walks you through several examples, explaining the permissions and ownership of files and directories in Linux.
By Steve Jones
I was looking back at my year and decided to see if SQL Prompt...
In the era of cloud-native applications, Kubernetes has become the default standard platform for...
By Steve Jones
I’ve often done some analysis of my year in different ways. Last year I...
Comments posted to this topic are about the item The North Star for the...
Comments posted to this topic are about the item Multiple Escape Characters
Hi, below i show various results trying to reach our ftp site (a globalscape...
In SQL Server 2025, I run this code (in a database with the appropriate collation):
SELECT UNISTR('%*3041%*308A%*304C%*3068 and good night', '%*') AS 'A Classic';
What is returned? See possible answers