Andreas Wolter on Evading Data Access Auditing
There are always bad actors who will seek to get access to and, likely, exfiltrate (exfil) the data. But they don't want to get caught; they don't want to...
2025-08-11
6 reads
There are always bad actors who will seek to get access to and, likely, exfiltrate (exfil) the data. But they don't want to get caught; they don't want to...
2025-08-11
6 reads
In today’s hybrid and multi-cloud world, managing SQL Server instances across diverse environments can be a daunting task. Enter Azure Arc—Microsoft’s game-changing solution that brings the power of Azure to...
2025-08-07
10 reads
The textile world is undergoing a transformation, one where creativity meets computation, and tradition dances with technology. Artificial intelligence is not just automating processes; it is unlocking new dimensions...
2025-08-07
8 reads
On August 6, 2025, Microsoft announced a vulnerability with hybrid deployments because of a shared service principal between the Exchange on-premises deployment and Exchange Online. The vulnerability is found...
2025-08-07
25 reads
Back in June I blogged about pig butchering and the amount of reported losses we're seeing here in the United States of America. This type of cyber scam is...
2025-08-06
13 reads
It’s just a few weeks until the PASS Summit on Tour in New York City. This is the first event in the series, and I’m excited to go back...
2025-08-06
6 reads
PostgreSQL is a powerful open-source relational database system, but over time, its tables and indexes can become bloated due to frequent updates and deletions. This can lead to inefficient...
2025-08-05
22 reads
(2025-Aug-04) Taking my last week of vacation and then volunteering at a children's summer camp has been part of my plan since last year, when I did the same thing....
2025-08-05
22 reads
Hello everyone! Just a quick note. I’ve removed all my slide decks from SlideShare. I found they were inserting ads into the slides and I didn’t sign up for...
2025-08-02
19 reads
Introduction Migrating databases can be a complex task, especially when dealing with large-scale systems or transitioning to cloud environments. The SQL Server Migration component in SQL Server Management Studio (SSMS) offers...
2025-08-01
54 reads
By Brian Kelley
If you're not having success in convincing your organization to send you to this...
By Rohit Garg
When deploying SQL Server in enterprise environments, choosing the right service account model is...
By Brian Kelley
There are always bad actors who will seek to get access to and, likely,...
Comments posted to this topic are about the item Determining the Updated Columns
Comments posted to this topic are about the item Carrots and Sticks
I am trying to create and Update query based on a like join. Is...
I am creating a trigger in SQL Server 2022 and want to detect a change in a table. Here is my table DDL:
CREATE TABLE CustomerLarge ( CustomerID INT NOT NULL IDENTITY(1,1) CONSTRAINT CustomerLargePK PRIMARY KEY CLUSTERED , CustomerName VARCHAR(20) , CustomerContactFirstName VARCHAR(40) , CustomerContactLastName VARCHAR(40) , Address VARCHAR(20) , Address2 VARCHAR(20) , City VARCHAR(20) , CountryCode CHAR(3) , Postal VARCHAR(20) , creditlimit INT , discount numeric(4,2) , lastorderdate DATETIME , lastorderamount NUMERIC(10,2) , lastordercontact VARCHAR(20) , created DATETIME , modified DATETIME , modifiedby VARCHAR(20) , statusid INT , active BIT , customersize INT , primarysalesid INT) GOIf I want to detect that the creditlimit was updated, what IF statements should I use? See possible answers