2014-03-26
2,069 reads
2014-03-26
2,069 reads
Steve Jones notes that security can be a reason to upgrade your systems, but it can also result in an endless cycle.
2014-03-26
107 reads
2014-03-13
1,724 reads
2014-03-12
1,859 reads
The script give you the list of all users and their respective Server roles
2014-04-02 (first published: 2014-03-11)
1,541 reads
2014-03-07
1,879 reads
Steve Jones notes that a data breach resulted in a lawsuit. How long before that's a common practice, and should we be preparing as data professionals.
2014-02-25
125 reads
We might not be able to stop hacks, attacks, or issues with our databases, but knowing that they've occurred is important. Steve Jones notes that we might need auditing more than security.
2014-02-24
151 reads
SQL Server security related tasks can be divided into four main categories: physical security, operating system level security, SQL Server configuration and user management. Here is your SQL Server security checklist.
2014-02-20
4,963 reads
We are interconnecting more and more computer systems and applications all the time. Security becomes a problem when one of these systems hasn't been properly configured, secured, or coded. Steve Jones notes this is becoming a real problem.
2014-02-18
119 reads
By Steve Jones
The season 1, seventh episode of Simple Talks is out. Check it out, with...
By Steve Jones
the McFly Effect – n. the phenomenon of observing your parents interact with people...
At a recent conference I was asked how I executed code during my presentation....
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers