Data Insecurity: A Perspective on Data Encryption
The focus of this paper is on the protection of PII data stored within a database using encryption technologies.
2013-03-07
1,663 reads
The focus of this paper is on the protection of PII data stored within a database using encryption technologies.
2013-03-07
1,663 reads
This paper provides a foundation for understanding data replication as well as a discussion of the criteria for selecting an appropriate replication technology.
2012-12-10
2,309 reads
This article has a description of an index utilization tool that Ron Johnson uses to analyze the effectiveness and use of indexes in a system.
2012-07-04 (first published: 2011-07-05)
19,231 reads
Describes the benefits of publishing instance performance metrics including a script to generate HTML-based Performance Snapshot.
2012-02-08
6,888 reads
Part II of a discussion and demonstration of ETL of a CSV data file using SSIS.
2012-01-12
9,586 reads
The first part of two parts of a paper discussion the implementation of a "real-world" ETL example using SSIS.
2012-01-05
15,615 reads
In this article, Ron Johnson shows how you can use DMVs for proactive real-time SQL Server performance monitoring.
2011-11-17
12,467 reads
This article contains an introduction to SQL Server indexes and how they are used in your queries.
2011-02-15
23,140 reads
A planning guide for the implementation of TDE in SQL Server.
2011-01-10
6,854 reads
By Steve Jones
Thanks to everyone that came to my talks. Slides are below. Best Practices for...
By Steve Jones
I can’t remember how I heard about Small Data SF 2024, but it caught...
By Steve Jones
moledro – n. a feeling of resonant connection with an author or artist you’ll...
Comments posted to this topic are about the item New article
Comments posted to this topic are about the item Monitoring Azure Blob Storage
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers