Problems displaying this newsletter? View online.
Database Weekly
The Complete Weekly Roundup of SQL Server News by SQLServerCentral.com
Hand-picked content to sharpen your professional edge
Editorial
 

Protecting Schools

One very common targets for hackers are schools and universities. The latter may have plenty of resources for staff, but often school systems don't have that same type of budget. In many ways, it's sad that hackers would target schools that struggle to educate and help others. The staff often deals with low pay and high stress already, and losing access to computer systems adds to an already tough job.

There was an interview this week with the director of technology at one district. Johnathan Kim works for the Woodland Hills school district and is a former staffer at the Navy Cyber Defense Operations Command. That's the type of training that I think few school district employees have. I've known a few people who manage technology inside schools, and while they are often smart, capable people, they aren't security professionals. 

The interview talks about a few of the changes that Mr. Kim has made, such as enabling two-factor authentication (2FA) and removing local admin rights for many teachers. I know these are the types of rules that frustrate many workers who use computers. In fact, I ran into someone who rarely upgrades software on their development machine because so many applications require administrative rights and they don't want to bother opening tickets more than a few times a year.

Two-factor authentication can be a pain, and I know I get confused sometimes as I have both 2FA and MFA with different processes for different systems. It's good in that a few times in the last year I've caught a hacking attempt, but it's also a pain to deal with when I'm doing something simple. I can see why people don't like it when they don't understand the challenges of securing systems. Every time I find myself frustrated, I stop and remember the problems others have had, especially those that have dealt with ransomware in their organizations.

A good point in the interview is that education can help smooth the way for security practices that feel unnecessary or disruptive. It's good to remind ourselves why we want the least privileges needed assigned to others, and why those of us with privileged access need a second account for that access. We also ought to come up with a good story to educate others when they complain, perhaps using a story of a breach or loss to help remind others that our systems are constantly under attack.

 

Steve Jones - SSC Editor

Join the debate, and respond to the editorial on the forums

 
The Weekly News
All the headlines and interesting SQL Server information that we've collected over the past week, and sometimes even a few repeats if we think they fit.
Vendors/3rd Party Products

Data Masking in Practice

This article takes a strategic look at common data masking and anonymization techniques, and the challenges inherent in protecting certain types of sensitive and personal data, while ensuring that it still looks like the real data, and retains its referential integrity, and distribution characteristics. It also explains, briefly, with references, the tools that one can use to mask different types of data and how to provision development and test machines with these 'de-sensitized' databases, or alternatively to produce fake data that looks like the real thing, but in fact is generated randomly.

Provisioning Clones for Flyway Projects

This article demonstrates how to use Redgate Test Data Manager to automate the delivery and teardown of data containers (clones) on four different RDBMS platforms: SQL Server, PostgreSQL, Oracle and MySQL, for use in Flyway development projects.

AI/Machine Learning/Cognitive Services

Video: Tips for Choosing a Classifier

From 36 Chambers – The Legendary Journeys

THE VIDEO THE SYNOPSIS In this video, I wrap up the series on classification and provide some quick-and-dirty tips on when to use each of the classification algorithms we...

Administration of SQL Server

Does Bit Column Order Matter in Tables?

From Brent Ozar Unlimited

At the PGConf.dev, where Postgres developers get t...

Query Store Keeps Switching Itself Off, Getting it Moving Again

From SQL Undercover

I recently received a complaint that Query Store f...

Inside SQL Server Backup and Restore History Pruning with sp_delete_backuphistory

From SQLServerCentral Blogs

I had a customer that was looking to document a restore that had occurred on one of their systems and didn’t see it. They had concerns about SQL Server... The...

Only Capture Extended Events For a Given Time

From Scary DBA (Grant Fritchey)

It’s a great question. Let’s say you want to capture stored procedure completions. But, you only want to capture them between 3AM and 4AM. Can you do it? Output...

DBAs, Organizing Your SQL Scripts in Git

From SQLServerCentral Blogs

I wrote an article that was published on SQL Server Central on how to get your scripts into Git. This post adds a few more thoughts on how you... The...

Azure DevOps

Set a Runtime Variable in an Azure DevOps Pipeline

From SQLServerCentral Blogs

Note: I DO NOT recommend this. Any changes to a pi...

Azure SQL

Public Preview: Shrink for Azure SQL Database Hyperscale

From Azure SQL

If you are using Hyperscale in Azure SQL Database, you know that it is a powerful tier that lets you rapidly scale up and scale out your database according...

Export Azure SQL DB to Storage

From SQLServerCentral Blogs

After a data migration, we needed to decommission the old Azure SQL DBs, but we wanted to keep a copy in case we needed anything later. Enter exporting an... The...

How to remove the credential for legacy Threat Detection feature from Azure SQL Database

From Azure Database Support Blog

(Written on May 30th, 2024)   If you come across a credential named something like 'https://xxyyzz.blob.core.windows.net/sqldbtdlogs' in the sys.database_scoped_credentials table of your Azure SQL Database and are unsure of its purpose. it is likely related to...

Career, Employment, and Certifications

Women in tech, is it still a man’s world?

From Purple Frog Systems

Looking back on my career, it dawned on me that I ...

T-SQL Tuesday #176: That Piece of Technical Advice for the Past Me

From SQLServerCentral Blogs

DIVERSIFY! We devote a lot of time to mastering the technology that we are passionate about or use for our jobs. For example, I specialized in Microsoft business intelligence,... The...

Fabric workloads and other items currently covered in the DP-600 exam

From Kevin Chant

Reading Time: 2 minutes In this post I want to provide some clarification as to which Microsoft Fabric workloads and other items are currently covered in the DP-600...

when someone else controls your slides

From Storytelling with Data

Recently, a workshop attendee asked for tips on how to handle a situation in which someone else is advancing your slides. I strongly believe the presenter is the best person...

Cloud - Azure

Getting Started with Azure CLI to Manage Azure Resources

From MSSQL Tips

Learn about Azure CLI and how to manage your Azure resources using commands instead of using the Azure portal.

Community Interests

(Livestream Replay) Embracing the Rewards of Data Platform Community Involvement - Ben Weissman

From Havens Consulting

DESCRIPTION Let us talk about the power of act...

Computing in the Cloud (Azure, Google, AWS)

Public Cloud Economics Aren't Adding Up for Some Telcos

From IT Pro - Microsoft Windows Information, Solutions, Tools

Running telco workloads in the public cloud is no ...

Conferences, Classes, Events, and Webinars

General program for PASS Summit 2024 now available

Did you know that the general program for PASS Data Community Summit 2024 (November 4-8) was recently unveiled? This year's lineup includes over 150 different sessions being delivered by over 140 speakers! This year's program also includes 16 incredible full day pre-cons, taking place on November 4 and 5, plus 6 different learning pathways to choose from. Join PASS Summit on-site for a whole week of connecting, sharing and learning with industry experts. Register before July 16 to secure a 3-day ticket at the early bird rate.

Save $350 on the PASS Summit if You Register Now.

From Brent Ozar Unlimited

Next Tuesday, pricing on the 3-day tickets for the PASS Data Community Summit goes up to $2,095. But if you register right now, plus use coupon code BRENTO24, it’s...

EightKB 2024 – Schedule and Registration

From SQLServerCentral Blogs

Hello Hello, We. Are. Back! The schedule for EightKB 2024 Edition has been announced! We’re kicking off at 1pm UTC on August 8th (8th of the 8th…get it? ... The...

Summer School Savings SALE is live!

From In Recovery...

Happy Fourth of July to all who celebrate! I’m looking forward to a great view Thursday evening looking west along the Skagit Valley with some friends up at Camp...

Join Me In Seattle To Learn Why Everything You Know About Isolation Levels Is Wrong

From Erik Darling Data

Everything You Know About Isolation Levels Is Wrong The PASS Data Summit session lineup has been announced! And, you know, since me and Kendra are double-teaming two days of precons...

DMO/SMO/Powershell

Extending Get-Process to show the Process Chain using PowerShell Proxy Functions

A proxy function or wrapper function allows you to deploy a custom version of a function or cmdlet while the internal functionality remains implemented. That means you can get a core cmdlet or function, add parameters (or remove), and write the code for these parameters, customizing a new version of this core cmdlet or function. Also, we get the begin, process and end block exposed from the PowerShell advanced functions, allowing control over the command steppable pipeline.

Export XML files from SQL Server using PowerShell

In this post I’ll demo how to export XML files from SQL Server via PowerShell.

Extending Get-Process to show the Process Chain using PowerShell Proxy Functions

From Simple Talk

A proxy function or wrapper function allows you to deploy a custom version of a function or cmdlet while the internal functionality remains implemented. That means you can get...

DevOps and Continuous Delivery (CI/CD)

Automating SQL Deployments using GitHub Actions - Part 2

From MSSQL Tips

This article demonstrates more complex scenarios and best practices for automating SQL deployments using GitHub Actions on an Azure SQL database.

HA/DR/Always On/Clustering

Running Jobs Only on Primary Replica in Availability Group

From Callihan Data

Transitioning from a failover cluster configuratio...

Hardware

Samsung Joins The 60 TB SSD Club, Looking Forward To 120 TB Drives

From AnAndTech

Multiple companies offer high-capacity SSDs, but u...

MDX/DAX

Calculate(), Filter() And DAX Memory Usage

From Chris Webb's BI Blog

Following on from my last post on the Query Memory Limit in Power BI, in this post I want to look at one of the most common DAX antipatterns...

Microsoft Fabric ( Azure Synapse Analytics, OneLake, ADLS, Data Science)

Microsoft Fabric Warehouse Access Control

From Curated SQL

Koen Verbeeck talks permissions: We are starting a new analytics project in Microsoft Fabric, and our data will land in a warehouse. This is the…

Loading Fabric Lakehouse Tables with partitions

From FourMoo

When loading data, it is always important to load the data with performance and scalability in mind. For lakehouse tables to return queries quickly and to scale it is...

Performance Tuning SQL Server

A Little About Hash Join Spills And Bailouts In SQL Server

From Erik Darling Data

A Little About Hash Join Spills And Bailouts In SQ...

A Little About Hash Aggregate Spills and SLEEP_TASK Waits In SQL Server

From Erik Darling Data

A Little About Hash Aggregate Spills and SLEEP_TASK Waits In SQL Server Thanks for watching! Going Further If this is the kind of SQL Server stuff you love learning...

Modifying sp_QuickieStore Returned Column Order

From SQLServerCentral Blogs

I love QuickieStore, but I wanted some columns to be at the front end of the results returned. Namely, I wanted top_waits, query_sql_text, and query_plan right after database name.... The...

PostgreSQL

Saving Data Historically with Temporal Tables: Part 1: Queries

In this article we discuss how to store data temporally in PostgreSQL. Temporal database store data in a way that allows you to see not only what the value of any column is currently, but at any point in time that your system is created to handle. In this three part series, I will aim to define what kind of information can be obtained from temporal tables and how to express requests for this information as SQL queries.

semab tariq: Key PostgreSQL Configuration Parameters for Enhanced Performance

From Planet Postgres

Learn how to configure key parameters to boost Transactions Per Second (TPS) and improve overall database performance. The post Key PostgreSQL Configuration Parameters for Enhanced Performance appeared first...

Andrei Lepikhov: Elaboration of the PostgreSQL sort cost model

From Planet Postgres

This post debates the current sort cost model, identifies its shortcomings, and proposes a new, more comprehensive model that expands the scope of the optimiser search. Designing this post...

Karen Jex: How Postgres is Misused and Abused in the Wild

From Planet Postgres

This post contains the slides from the talk that I gave at PGConf.dev in Vancouver a few weeks ago, together with the transcript and other information. ...

PowerPivot/PowerQuery/PowerBI

Cross-Highlighting a Visual Using a Slicer ?!?

From Havens Consulting

 

Leverage Power Query Parameters with Power BI Paginated reports

From Guy in a Cube

You've seen how you can use Power Query within Pow...

Learning through ‘Unconventional’ Power BI Projects

From Purple Frog Systems

When we think of Power BI projects we typically think of solving business problems through creating insightful analytical reports and dashboards, Power BI is fantastic for this. However, when...

Product Reviews and Articles

Running Database Tasks and Tests on Clones in Redgate Test Data Manager

From Product learning – Redgate Software

This article demonstrates how to adapt your current database development and testing regimes to use clones (data containers) in Redgate Test Data Manager. It demonstrates how to handle dynamic...

Product Upgrades and Releases

Updated First Responder Kit and Consultant Toolkit for July 2024

From Brent Ozar Unlimited

The next release would normally be August, but I’m doing a release a little early in order to fix 2 issues with the Consultant Toolkit. The May release broke...

R Language

Little useless-useful R functions – Dragon curve

From TomazTsql

Let’s play with some dragons. Dragons from the Jurassic park or the board game dungeon and dragons. The algorithm is a fractal curve of Hausdorff dimension 2. One starts...

SQL Server Security and Auditing

SQL Injection: Deconstructing an Attack

From StraightPath Solutions SQL Blog

This post is part of our SQL Server security blog ...

Security News and Issues

What Cybersecurity Defense Looks Like for School Districts

From IT Pro - Microsoft Windows Information, Solutions, Tools

Dark Reading chats with Johnathan Kim, director of technology at the Woodland Hills School District in North Braddock, Penn., about why cybercriminals target schools — and what they can...

New Open SSH Vulnerability

From Schneier on Security

It’s a serious one: The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems; that...

The State of Data Breaches, Part 2: The Trilogy of Players

From Troy Hunt's Blog

Last week, I wrote about The State of Data Breache...

Hacked Software Firm CDK Expects All Dealers Live by July 4

From IT Pro - Microsoft Windows Information, Solutions, Tools

Some dealerships are losing revenue amid slow sales and demand.

Tech News

Radar Trends to Watch: July 2024

From O'Reilly Radar - Insight

Can anything that is programmable have an embedded LLM? Apparently so. llama.ttf is a plain old font that looks like Open Sans—you can download it and install it. We...

Employees Beginning to See Benefits of AI Autonomy in the Workplace

From IT Pro - Microsoft Windows Information, Solutions, Tools

Workers are now comfortable delegating nearly half of their tasks to AI and expect to trust AI even more to operate autonomously in the future, a Salesforce survey reveals.

Future-Proofing Development with Low-Code/No-Code Solutions in the Age of AI

From IT Pro - Microsoft Windows Information, Solutions, Tools

Here's how low-code/no-code solutions are addressing the developer shortage and transforming application development.

The Lighter Side

CodeSOD: Looks Guid to Me

From Daily WTF

Today, we have an interesting one. It's not technically a Code SOD, because it doesn't have any code. It isn't quite a feature, because it doesn't contain a story....

CodeSOD: Black Letters

From Daily WTF

Johannes started debugging an application, and decided he needed to "share his pain". Here, we're presented with a simple problem: convert a number in the range [0-25] to a letter...

Virtualization and Containers/Kubernetes

Docker Logging Guide Part 2: Advanced Concepts & Best Practices

From Simple Talk

Welcome to part 2 of our Docker Logging Guide seri...

 
RSS FeedTwitter
This email has been sent to {email}. To be removed from this list, please click here. If you have any problems leaving the list, please contact the webmaster@sqlservercentral.com. This newsletter was sent to you because you signed up at SQLServerCentral.com. Note: This is not the SQLServerCentral.com daily newsletter list, and unsubscribing to this newsletter will not stop you receiving the SQL Server Central daily newsletters. If you want to be removed from that list, you can follow the instructions on the daily newsletter.
©2019 Redgate Software Ltd, Newnham House, Cambridge Business Park, Cambridge, CB4 0WZ, United Kingdom. All rights reserved.
webmaster@sqlservercentral.com

 

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -