The Mysterious Case of the Missing Default Value
Sometimes things are not exactly how we think they are. Read the story of the missing default value and learn why.
2017-03-24 (first published: 2015-12-01)
7,020 reads
Sometimes things are not exactly how we think they are. Read the story of the missing default value and learn why.
2017-03-24 (first published: 2015-12-01)
7,020 reads
Transparent Data Encryption (TDE) encrypts the data within the physical files of the database, the 'data at rest'. Without the original encryption certificate and master key, the data cannot be read when the drive is accessed or the physical media is stolen. The data in unencrypted data files can be read by restoring the files to another server. TDE requires planning but can be implemented without changing the database. Robert Sheldon explains how to implement TDE.
2017-03-24
5,410 reads
This is an investigation, to get an impression on the impact of the used disk space before and after compression considering different index types.
2017-03-23
2,366 reads
Arshad Ali discusses the architecture of Azure SQL Data Warehouse and how you can scale up or down, based on your need.
2017-03-23
4,160 reads
How to do database development with trunk based development and Continuous Delivery
2017-03-22
2,391 reads
Aaron Bertrand shows how to implement simple triggers that maintain trigram-type tables used for better supporting wildcard searches.
2017-03-22
4,058 reads
Sometimes, it isn't the technicalities or details of database source control that people find difficult, but the general concepts and workflow. In this article, taken from Robert Sheldon's book 'SQL Server Source Control Basics' , he takes a step back from the details to explain the whole purpose of database source control and the most important operations within source control such as versioning, branching and merging.
2017-03-21
5,188 reads
This time we explain how to recover an Azure SQL Data Warehouse (ASDW) from a disaster.
2017-03-20
3,643 reads
Many organizations are taking advantage of the benefits of cloud computing such as lower capital expenditures and increased agility, while still maintaining data in on-premises data stores. This paper describes best practices for security, networking, and component architecture for building a hybrid business intelligence (BI) environment by using a combination of Microsoft Office 365, Microsoft Azure, and on-premises data sources.
2017-03-20
4,239 reads
Windowing functions aren't just for analyzing numbers/dates. Using windows functions to analyze when a character field changes is a little know resource
2017-03-17 (first published: 2016-02-17)
12,166 reads
By Steve Jones
Thanks to everyone for attending my session on running a Local LLM. If you...
By Steve Jones
I do believe that Redgate has been very customer focused since it’s inception. I’ve...
By gbargsley
It's 2 AM. Your phone is going off. Users can't connect to the application,...
Hi everyone I am getting below warning when I run SSIS: Warning: 0x80049304 at...
Comments posted to this topic are about the item Let's Talk Community Events!
Hi as shown below a replication target requires a primary key. if we want...
By default, how often is the SQL Server Database Engine checking for deadlocks?
See possible answers