External Article

Schema-Based Access Control for SQL Server Databases

Access-control within the database is important for the security of data, but it should be simple to implement. It is easy to become overwhelmed by the jargon of principals, securables, owners, schemas, roles, users and permissions, but beneath the apparent complexity, there is a schema-based system that, in combination with database roles and ownership-chaining, provides a relatively simple working solution.

External Article

Automating Image-Based Deployment of SQL Server on Azure IaaS VMs - Preparing OS Image

There are several different approaches to automating deployment of SQL Server Infrastructure-as-a-Service virtual machines in Microsoft Azure. Marcin Policht examines an approach that involves uploading or creating a custom operating system image which is well suited for scenarios where you want to deploy a custom-configured SQL Server instance to multiple virtual machines with minimal effort and maximum consistency.

Blogs

Creating a Pulsing Conducting Baton - Part 1

By

Train Wreck The last time I watched a high school band nearly fall apart mid-performance...

ISACA AI Material/Exam Prep Discount (May 18 – June 30, 2026)

By

If you are considering any of the ISACA AI certs like the Advanced Artificial...

A Fabric solution can be very cost effective

By

Are you currently using Microsoft Fabric or considering migrating to it? If so, there...

Read the latest Blogs

Forums

We Are Eating Our Own Seed Corn

By dbakevlar

Comments posted to this topic are about the item We Are Eating Our Own...

Before Using AI with Business Data, Read This

By rom_c99

Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...

Designing SQL Server ETL Pipelines That Don't Break at Scale

By SQL Expert

Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...

Visit the forum

Question of the Day

Detecting Deadlocks Quickly

In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?

See possible answers