Prevent Confidential Data at the Application Layer from getting into SQL Server
In this tip Tim Smith looks at different approaches to stop confidential data from getting into the database.
In this tip Tim Smith looks at different approaches to stop confidential data from getting into the database.
SQL Server MVP Jeff Moden shows us a new very high performance method to convert an "Adjacency List" to “Nested Sets” on a million node hierarchy in less than a minute and 100,000 nodes in just seconds. Not surprisingly, the "steroids" come in a bottle labeled "Tally Table".
Steve Jones wants to know if you have compelling reasons to upgrade or not upgrade this week.
Test-Driven Development (TDD) involves the repetition of a very short development cycle that begins with an initially-failing test that defines the required functionality, and ends with producing the minimum amount of code to pass that test, and finally refactoring the new code. Michael Sorens continues his introduction to TDD by implementing the first tests and introducing the topics of Test doubles; Test Runners, Constraints and Assertions.
In this chapter, we will learn how to create Data Mining Reports using Reporting Services.
In this chapter, we will learn how to create Data Mining Reports using Reporting Services.
A list of the commandments, or at least suggestions, that Simon Holzman sees as important for IT professionals.
Mike Martin kicks off his series on Azure Virtual Machines with a primer, full of background and terms. To fully understand the Azure Virtual Machines offering, Mike explains how everything is connected and co-existing.
Steve Jones talks about one of the least favorite things for IT people: documentation. How much do you really need to do?
After you have done the necessary groundwork of standardising and centralising your database adminstration processes, you are now in a position to implement some effective automation of some of these processes. Which ones do you choose, and how do you set about automating these tasks?
By Brian Kelley
My most recent bout with imposter syndrome was with ISACA’s Digital Trust Ecosystem Framework...
By Steve Jones
“On the way to a grand goal, celebrate the smallest victories as if each...
Materialized lake views (MLVs) in Microsoft Fabric are an effective way to implement medallion...
Pertokoan Paradise, Jl. Paradise 11 No.23 Blok J-1 No. 6 & 7, Papanggo, Kec....
Jl. HOS Cokroaminoto Jl. Ciledug Raya, RT.001/RW.006, Kreo Selatan, Kec. Larangan, Kota Tangerang, Banten...
Jl. Utan Kayu Raya No.94, RT.12/RW.10, Utan Kayu Utara, Kec. Matraman, Kota Jakarta Timur,...
How can I alter the deadlock detection interval to 2 seconds instead of 5 seconds on my SQL Server 2025 instance?
See possible answers