SQL Server สาธารณะ
[search 0]
ดาวน์โหลดแอปเลย!
show episodes
 
Artwork

1
SQL Server Radio

Guy Glantser, Eitan Blumin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
SQL Server Radio is a Podcast for SQL Server DBAs, database developers, architects, system administrators, and anyone else who is interested in the Microsoft SQL Server platform and the Microsoft data platform in general. As the data world changes, we also occasionally talk about other platforms and services like Azure and Amazon cloud services, Elastic Search, Hadoop, MongoDB, Machine Learning, and much more.
  continue reading
 
Artwork

1
SQL Data Partners Podcast

Carlos L Chacon

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
Hosted by Carlos L Chacon, the SQL Data Partners Podcast focuses on Microsoft data platform related topics mixed with a sprinkling of professional development. Carlos and guests discuss new and familiar features and ideas and how you might apply them in your environments. Visit our website for episode show notes at marathonus.com/podcast and leave a comment if you have a topic you think we should discuss. We’ll see YOU on the SQL Trail.
  continue reading
 
Artwork

1
Knee-deep in Tech

Alexander Arvidsson, Simon Binder, Heini Ilmarinen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน+
 
Knee-Deep In Tech is a weekly technology podcast covering IT and technology, focusing on the Microsoft stack. We are three MVPs and Microsoft Certified Trainers with between us over 40 years of IT infrastructure experience. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Emergent Podcast

Emergent Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
Brought to you by Emergent Software, we talk about the latest news and tips in the software engineering and Microsoft world. Visit https://www.emergentsoftware.net/ to see how you can become more efficient and effective using the Microsoft Cloud.
  continue reading
 
Artwork

1
Application Hero Podcast

Brian Henderson & Neil Salamack

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
  continue reading
 
Artwork

1
DBAle

Redgate

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
Each episode Chris and Chris will be discussing topics and news from the world of SQL Server, while enjoying and chatting about beer! So, grab yourself a beer and tune in, cheers.
  continue reading
 
Artwork

1
ROCK Cast

Spark Development Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
Podcast giving the latest updates and information about the Rock RMS system. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Data Podcast

Rajib Bahar, Shabnam Khan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
Our podcast includes both technical & non-technical discussions on BigData, DataScience, BI, AI, DW, Business Intelligence, TDWI, SqlServer, SQL, NoSql, AWS, Azure, R, Python. Hosts: Rajib Bahar, Shabnam Khan
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork

1
The Deep Stack Podcast

Defang & Éphémère Creative

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายวัน+
 
A podcast where we explore everything in a modern (and not so modern) application stack. Join us as we talk about everything from modern TypeScript to old-school D.lang, Postgres to SQL Server, Heroku to AWS and everything in between, as we break down different apps, their stacks, and architectures.
  continue reading
 
Artwork

1
Microsoft Mechanics Podcast

Microsoft Mechanics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายสัปดาห์
 
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
  continue reading
 
Artwork

1
Data and Confused

Glen Kendell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน+
 
Glen Kendell sits down with industry experts to explore the often-murky waters of data in various sectors. Each episode breaks down how complex, overwhelming, or just plain confusing data can be—and, more importantly, how to make sense of it. Data and Confused offers insightful conversations, real-world examples, and practical takeaways to help bring clarity to the chaos.
  continue reading
 
Artwork

1
The Directions on Microsoft Briefing Podcast

Directions on Microsoft

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายสัปดาห์
 
With more than 30 years of experience covering Microsoft, Directions on Microsoft provides unique perspectives about the shifts in Microsoft technologies, roadmaps and licensing policies that matter most to enterprise-size companies. Twice each month industry veteran Mary Jo Foley interviews a different Directions analyst for informed insights and advice to help you derive full value from your Microsoft investments.
  continue reading
 
Artwork

1
LearnKey - Train the Planet

LearnKey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
LearnKey, Inc., is a premier global provider of on-demand training solutions for corporate, education, government and personal users. View some tips from IT and business industry experts. Look for more great podcast soon.
  continue reading
 
Artwork

1
Tech Sessions

e360

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
This is the show for IT leaders looking to move fast, optimize costs, and protect against the latest security threats in their IT environments. In each episode, discussions tackle one aspect of IT, from cloud computing and digital workplace to modern infrastructure and cybersecurity. If you're looking to stay ahead in the game, enhance your organizational agility, and secure your digital assets, you've come to the right place.
  continue reading
 
Artwork

1
Datascape Podcast

Warner Chaves

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
Each episode, we bring in expert guests to discuss data-based technologies, business and the related market issues. We consider it "Business Technical," not too technical, but not too vanilla. We discuss what different technologies are, how they can be used and the best learning resources for you to get started. We'll be spending a lot of time on the Cloud's effect on IT as well as IT careers. We publish every two weeks, and we love feedback! Want to be a guest? Have an idea? I'd love to hea ...
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Loading …
show series
 
Guy and Eitan discuss security-related best practice scripts, and several interesting AI topics. Relevant links: microsoft-dbas-club/Security and Compliance/Check_Passwords_SQL_Server_Generated.sql microsoft-dbas-club/Security and Compliance/Best Practice Checks/Invalid_owner_for_system_schema_role_or_database.sql microsoft-dbas-club/Security and C…
  continue reading
 
pdf-parser: All Streams Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams. https://isc.sans.edu/diary/pdf-parser%3A%20All%20Streams/32248 Salesloft Drift Putting OAuth Tokens at Risk OAuth tokens used by Salesloft Drift users to provide access to integrations with Salesforce, Google Works…
  continue reading
 
In this episode Michael and Sarah talk to Russ Rogers from the Xbox team about gaming security in general and Xbox specifically. This is the first time we have covered the topic! There is also so much news, we really list all the announcements here! It's about 9 mins of security news! https://aka.ms/azsecpod…
  continue reading
 
Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increasing%20Searches%20for%20ZIP%20Files/32242 FreePBX Vulnerability An upatched vulnerability in FreePB…
  continue reading
 
A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
  continue reading
 
In this episode of JavaScript Jabber, I sit down with Delaney Gilliland to dive into why most of us are building the front end wrong—and what a faster, leaner, and simpler alternative could look like. We explore his background in game development and military applications, which gave him a unique perspective on web performance and real-time data ch…
  continue reading
 
Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
  continue reading
 
This is episode 302 recorded on August 20th, 2025, where John & Jason talk the Power BI August 2025 Feature Summary including Copilot in Embedded Reports for SharePoint Online, edit your data model in the Power BI service, TMDL view enhancements, Semantic Model refresh templates with Fabric Data pipelines, and more.For show notes please visit www.b…
  continue reading
 
Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
  continue reading
 
What are common mistakes folks are making with their Azure tenant(s)? While at the Kansas City Developers Conference, Richard chatted with Scott Sauber to run down his top ten list of issues he checks on for all his customers using Azure. From tenant ownership to naming conventions, policies, identities, and cost controls - there are a lot of thing…
  continue reading
 
Starting Nov. 1, Microsoft is dropping the programmatic discounts that were baked into its volume-licensing agreements. But price hikes are just one of the resulting fallouts for which enterprises need to prepare immediately, as Directions' lead negotiator Dean Bedwell details in this episode with Mary Jo Foley.…
  continue reading
 
Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
  continue reading
 
What if happiness isn’t something you chase, but something you choose? In this episode, Glen sits down with Tobin Smith, founder of The Happiness Department, to explore how gratitude, curiosity, and reframing hardships can transform both life and business. From Stoic philosophy to personal branding and even the role of AI, Tobin shares practical to…
  continue reading
 
The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
  continue reading
 
In this episode of JavaScript Jabber, we dive deep into the world of vibe coding—what it means, how it works in practice, and why it’s changing the way developers build software. I’m joined by Anthony Campolo, who shares his hands-on experience developing AutoShow, an app that automates podcast show notes, using AI-assisted workflows. We talk about…
  continue reading
 
Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
  continue reading
 
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
  continue reading
 
This is episode 301 recorded on August 20th, 2025, where John & Jason talk with friends and fellow podcasters Andrew Connell & Julie Turner of the Code.Deploy.GoLive show about how this podcast is AC's fault in the first place, what they are doing with their new podcast, community, and general shenanigans to celebrate the BIFocal.show's 300th episo…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
How do you secure your organization's data to let AI technologies work safely? Richard chats with Martina Grom about her experiences helping sysadmins responsibly bring the power of Microsoft M365 Copilot into their organizations. Martina discusses setting up security and monitoring with tools like Microsoft Purview, enabling visibility into where …
  continue reading
 
Build AI agents to automate complex workflows—like project planning and go-to-market strategies—without writing code, all with Microsoft Copilot Studio. Use triggers to launch processes from signals like approval emails, connect to the right data with Model Context Protocol (MCP) for faster, more accurate responses, and coordinate multiple agents t…
  continue reading
 
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
This episode takes you behind the scenes of what's happening in Rock, starting with a version update and a look at what’s coming in v17.3. The team explores integration best practices and systems thinking to help church digital teams work smarter and more effectively. You’ll also get a first look at RX25—registration is open, the schedule is live, …
  continue reading
 
AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
  continue reading
 
In this episode of JavaScript Jabber, we sit down with Vinicius Dallacqua, a seasoned software engineer with a passion for performance and developer tooling. Vinicius shares his journey from coding in central Brazil with limited connectivity to building cutting-edge tools like PerfLab and PerfAgent. We dive into the intersection of AI and DevTools,…
  continue reading
 
CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
  continue reading
 
Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
  continue reading
 
Are you tapping the power of Microsoft Graph? Richard chats with Tony Redmond about his work teaching people to leverage Microsoft Graph and all the insights it can provide about their organization. Tony views Graph as one of the key skills a sysadmin needs to manage an M365 tenant, alongside Exchange Online, SharePoint, and Teams. Throw in some En…
  continue reading
 
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
  continue reading
 
Cybersecurity expert Markus Schober returns to dive deep into the world of APTs—Advanced Persistent Threats. In this episode, we unpack what APT groups are, how they operate, and why they pose a growing risk to both companies and everyday users. From nation-state cyber espionage to ransomware-as-a-service models and supply chain attacks like SolarW…
  continue reading
 
Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
  continue reading
 
Is there still a place for no/low-code tools like those in Microsoft's Power Platform with the rise of generative AI and GitHub Copilot? The New Stack's news editor Darryl Taft joins Directions Rob Sanfilippo and Mary Jo Foley to debate the topic.โดย Mary Jo Foley
  continue reading
 
Loading …

คู่มืออ้างอิงด่วน

ฟังรายการนี้ในขณะที่คุณสำรวจ
เล่น