Server virtualization projects are driven by a desire for consolidation, yet the uncontrolled proliferation of virtual machines can result in just the opposite Think server sprawl is bad now? Just ...
SQL Server has a long list of roles for server, database, and applications that outline things like permissions, data selection and modification, and disk management. Examine how roles play a part in ...
UPDATE: The story that originally got my attention has been updated in all of the places I could still find it yesterday, so I’m pulling my references to the story and just focusing on the positive ...
Microsoft on Thursday announced new Extended Security Updates plans that add three years of patch support for organizations using SQL Server 2008/R2 and Windows Server 2008/R2 products. The Extended ...
On the surface, security questions surrounding virtual servers don’t seem much different than those for the physical machines on which they run. In fact, starting a virtual security audit by keeping ...
When it comes to sampling innovative technology, Schwan Foods, a multibillion-dollar frozen food producer, digs right in. How to seed security into the cloud The Marshall, Minn., company became an ...
How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots Like so much of IT, database security requirements largely ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna and two ...
Microsoft is aiming to shore up the security of its SQL Server database management software. The next version of SQL Server, code-named "Yukon," will include a long list of new security-related ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results