Exploring SQL Server 2016 Always Encrypted – Part 4 – Encrypting Existing Data
Greg Larsen explores the different ways that you can encrypt your existing confidential data using Always Encrypted Columns in SQL Server 2016.
Greg Larsen explores the different ways that you can encrypt your existing confidential data using Always Encrypted Columns in SQL Server 2016.
This article gives an overview of the Microsoft Azure SQL Data Warehouse architecture. The new platform-as-a service (PaaS) offering provides independent compute and storage scaling on demand and is currently in public preview.
An explanation as to what Log Shipping is and why it's still a viable solution in 2016.
The whole point of using a cloud service is to be able to use it intensively for a brief period just when it is needed and then clear out all your work when you've finished. This means automation to make the process as quick and easy as possible. It is likely to mean creating a VM, provisioning it from scratch and spinning it up using PowerShell. Relax, grab the popcorn, and let Adam Bertram show you how he does it in Azure.
Passwords are always a challenge, but are bad passwords the users' fault? Steve Jones has a few thoughts.
Arshad Ali demonstrates what the APPLY operator is, how it differs from regular JOINs, and what its applications are.
Steve Jones talks version control, but from the production perspective.
Traditional deployments of Azure SQL Database involve identifying projected resource requirements and selecting individual Azure SQL Database instances. For fluctuating workloads, this frequently results in over- or under-provisioning. To address this challenge, Microsoft offers another approach to sizing Azure SQL Database that relies on Elastic Database Pools. Marcin Policht takes a look.
Someone made a call to architect zero downtime for databases. Steve Jones isn't sure this is the best thing you could do.
You can develop a Power BI Dashboard that uses an R machine learning script as its data source and custom visuals. Here is a simple example that shows how to connect to data sources over the Internet, cleanse, transform and enrich the data through the use analytical datasets returned by the R script, design the dashboard and finally share it.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item Dancing Robot Goes Rogue
Hi , i installed winscp on my pc, added it to GAC thru vs...
Comments posted to this topic are about the item Identities and Sequences II
In thinking about the differences between the identity property and a sequence object, which of these two guarantees that there are consecutive numbers (according to the increment) inserted in a single table?
See possible answers