There are several tools available to keep a MySQL database secure. In this article Lukas Vileikis discuses access control and user privileges.
In this article we look at how to create a SQL Server database snapshot and how snapshots can be used for reporting, auditing and more.
I've just finished working in my fourth shared work space. I am not a fan. The endless hallways with all these little glassed in rooms where I can see everyone, and everyone can see me, are not my favorite places. I can see white boards with content that maybe I shouldn't be seeing. There are […]
Long term data storage isn't something we always need for databases, but it is something the world needs. A new technology has promise for those use cases, both in durability and preserving the algorithms needed.
This article shows how you can randomize dates in T-SQL, but keep the month and year the same while the day varies.
Join Grant Fritchey to discover how automating your database deployments enables you to speed up software delivery with repeatable processes that stop your database being the bottleneck.
In this article we look at how to use exception handling when writing Python scripts along with many different examples using try, except, else and finally clause.
The pandemic has meant a lot of people started new jobs remotely. Steve has a few thoughts on this process.
In the ninth level of this stairway, learn how to add security to the tabular model.
By Patrick
SQL Server Audit is an efficient way to track and log events that occur...
I presented at SQL Saturday Pittshburgh this past weekend about populating your data warehouse...
By Steve Jones
A customer was asking recently about the RPO for their estate, and I showed...
Comments posted to this topic are about the item New article
Comments posted to this topic are about the item Monitoring Azure Blob Storage
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers