Row Level Security Part 3 – Disabling Row Level Security for DBAs and Database Owners
In the third part of his series on Row Level Security (RLS), Greg Larson shows how to disable RLS for database administrators, sysadmins, and database owners.
In the third part of his series on Row Level Security (RLS), Greg Larson shows how to disable RLS for database administrators, sysadmins, and database owners.
Paul White discusses the internals of SQL Server's WITH ENCRYPTION clause, and explains why it is not as safe as you might think.
The worst part for a DBA of getting started with PowerShell is often just figuring out the best way of working with SQL Server. The most suitable approach to accessing SQL Server depends on the sort of task you need to produce a script for. Laerte Junior aims at a simple guide to the most common approaches and when to use them.
One of the things that will be debated quite a bit in the next few years will be the penalties for data loss.
IronPython is a Python implementation build on .NET. This article shows how you can use IronPython to access SQL Server Management Objects.
Automated configuration management is simpler with Desired State Configuration (DSC) and Push mode, but what is the best way to use DSC to automate deployments on your machines? ‘Push’ mode or ‘Pull’ mode? How can you reduce configuration-drift over time? Nicolas Prigent describes the second DSC deployment mode: Pull mode.
Using the APPLY operator to reduce repetition and make queries DRYer.
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Comments posted to this topic are about the item We Are Eating Our Own...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers