I was asked this question while having a chat with a few friends. Mainly the complaint was I don’t have a lot of social media presence. The only […]
Performance comparison between Plain text, Hashing and Cell level encryption
In this blog post I am doing a quick comparison on the performance implications of using Cell level encryption vs Hashing vs storing the data as plain text […]
Configuring User Defined Server Roles in MS SQL Server
In this quick video I cover how to setup User Defined Server Roles in MS SQL Server, we use this feature to provide granularity to the DBA permissions […]
User based security in SSAS
Recently a trainee from one of my MSBI trainings contacted me about how to implement user based security in SSAS. This is a common requirement where companies want […]
Cell level encryption
Encrypting data at the cell level is important in order to protect information within the database. While all users have access to view data not all users are […]
Row level permissions in SQL Server
We all know that SQL allows object level permissions down till the table, some of even know that it allows permissions at the column level too. But recently […]
SQL INJECTION using Dynamic SQL and How to fix it
At a training recently I was explaining how to do as well as prevent SQL injection and figured I should make a blog about it since very few […]
Creating a Network and Domain in Windows Server
This blog covers creating a simple domain in order to setup a windows failover cluster. The intention here is not to cover the details of setting up an […]
Network connectivity issues AWS SQL Express instance
Amazon is one of the premier cloud solutions providers out there and they offer development houses a number of solutions and features that cater to almost any requirement […]
How to reassign a Domain name in BIG ROCK
I recently needed to perform the above operation as part of moving my website. Let me first explain my setup and then the steps that were performed to […]