Data Insecurity: A Perspective on Data Encryption
The focus of this paper is on the protection of PII data stored within a database using encryption technologies.
2013-03-07
1,823 reads
The focus of this paper is on the protection of PII data stored within a database using encryption technologies.
2013-03-07
1,823 reads
This paper provides a foundation for understanding data replication as well as a discussion of the criteria for selecting an appropriate replication technology.
2012-12-10
2,430 reads
This article has a description of an index utilization tool that Ron Johnson uses to analyze the effectiveness and use of indexes in a system.
2012-07-04 (first published: 2011-07-05)
19,314 reads
Describes the benefits of publishing instance performance metrics including a script to generate HTML-based Performance Snapshot.
2012-02-08
6,947 reads
Part II of a discussion and demonstration of ETL of a CSV data file using SSIS.
2012-01-12
9,619 reads
The first part of two parts of a paper discussion the implementation of a "real-world" ETL example using SSIS.
2012-01-05
15,733 reads
In this article, Ron Johnson shows how you can use DMVs for proactive real-time SQL Server performance monitoring.
2011-11-17
13,509 reads
This article contains an introduction to SQL Server indexes and how they are used in your queries.
2011-02-15
23,334 reads
A planning guide for the implementation of TDE in SQL Server.
2011-01-10
7,305 reads
In last months one of the scenarios where you can use AI has been...
By ChrisJenkins
Do you spend so long manipulating your data into something vaguely useful that you...
By Steve Jones
It was neat to stumble on this in the book, a piece by me,...
Comments posted to this topic are about the item Creating JSON II
Comments posted to this topic are about the item Engineer Lessons
On SQL Server 2025, what happens when I run this code:
SELECT JSON_OBJECTAGG( N'City':N'Denver' RETURNING JSON) GOSee possible answers