If only the US would follow ...
Governments are requiring better security, and Steve wishes the US would follow.
Governments are requiring better security, and Steve wishes the US would follow.
Describe and provide a set-based method that takes a multiple character split term and returns as a table
When using Transparent Data Encryption, you might wonder “What is the state of my transparent data encrypted database?” Read on to learn the many different states that a transparent data encrypted database might go through.
TEMPDB Enhancements in SQL Server 2016 - By default enforced to follow best practices.
The key challenge for application developers is to build a foolproof system to ensure data security. This is not only more intense, but more complex these days, as many organizations are planning to move their applications to the cloud. Read on to learn more.
The title says it all. The great developers will use source control. This habit might not make you great, but it will help you improve.
Hot standby disaster recovery process where SharePoint farm will become available in minutes
In the final article in this series, Robert Sheldon demonstrates combining data sources with multiple formats into one Python data frame.
Did you know you can query SQL Server data with U-SQL? It's true! Find out how in this latest stairway step.
Thank you to everyone who participated in T-SQL Tuesday #198! When I wrote the...
Efficient query performance in Amazon Redshift often comes down to how well you manage...
By gbargsley
Welcome back to PowerShell Strikes Back. We’re three weeks in, and the training is...
Comments posted to this topic are about the item Stairway to Reliable Database Deployment...
Comments posted to this topic are about the item QUOTENAME Quote Parameters
Comments posted to this topic are about the item Limit the Blast Radius
When I use QUOTENAME(), I can optionally provide the character used to surround the string in the result. Can I use any character?
See possible answers