Software Development

External Article

Securing SQL Server with DoD guidelines

  • Article

Making sure your SQL Servers are secured against malicious users is difficult. The United States Defense Information Systems Agency (DISA) publishes a set of guidelines for organizations securing different pieces of software that connect to the US Department of Defense’s networks (DoD). Whether you’re working with the DoD or not, these Security Technical Implementation Guides (STIGs) are a good resource to help you understand potential security vulnerabilities and mitigate them.

2021-02-22

External Article

Normal Forms

  • Article

To prevent data change anomalies, a database should be normalized. Did you know that there are 10 normal forms? In this article, Joe Celko reviews normalizing databases including commonly used normal forms.

2020-12-15

Blogs

Simple Talks Episode 9–Data masking and subsetting

By

The episode on data masking and subetting is out. You can see it here:...

T-SQL Tuesday #180: Avoid Perfect for Good Enough

By

I'm listening to Effortless by Greg McKeon (link to author's page) through Audible.com. He...

Book Review – Humanizing Data Strategy by Tiankai Feng

By

This book was making its rounds on social media, and the concept seems interesting...

Read the latest Blogs

Forums

Ingesting Data From REST API endpoints: Data Engineering with Fabric

By John Miner

Comments posted to this topic are about the item Ingesting Data From REST API...

Separate Reads

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Separate Reads

The Hash Join I

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Hash Join I

Visit the forum

Question of the Day

The Hash Join I

What are the two inputs called to a hash join operation in SQL Server? (choose 2)

See possible answers