Additional Articles


External Article

PowerShell Desired State Configuration: DSC Resources

Desired State Configuration (DSC) allows you to automate the way that you manage configuration data for software services as well as the environment in which these services run. DSC uses a set of built-in and custom 'resources' as the building blocks for a configuration. If you have specific requirements you may need to create the relevant resource to make the configuration happen. Nicolas Prigent provides a practical guide to DSC resources.

2016-09-27

3,764 reads

External Article

Querying Multiple MySQL Tables

It’s been said that one of the drawbacks to normalization to the third form (3NF) is more cumbersome data extraction due to the greater number of tables. These require careful linking via JOIN clauses. Improper table joining can easily result in erroneous results or even in the dreaded Cartesian Product. In today’s article, Rob Gravelle explores how table joins are achieved in MySQL.

2016-09-23

3,720 reads

External Article

Using SQL Compare with Row Level Security

Row Level Security is one of many new features in SQL Server 2016. It provides a much easier, consistent, and maintainable solution for row-based security rules. In this blog post, Data Platform MVP Steve Jones introduces this new feature, and walks through how Redgate SQL Compare can safely and reliably handle RLS changes.

2016-09-15

3,121 reads

External Article

Direct Query with Power BI

Power BI allows you to connect directly to the data just as if it were a “standard” connection, and modify and extend the data to support analytics. By using DirectQuery, you can build reports based on extremely large datasets where re-importing data not a practical solution. It also allows you to do data aggregations on the server. There are, of course, restrictions as well but it is nevertheless a worthwhile technique to use where appropriate. Adam Aspin explains all.

2016-09-13

4,392 reads

Blogs

SQL Server Journey Part 2: Modern Era (2017 – 2026) – AI/Cloud First

By

Following up on my Part 1 baseline, the journey from 2017 onward changed how...

Google Moves Up Post-Quantum Cryptography Timeline

By

In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...

The Book of Redgate: No Politics

By

In today’s world, this might mean something different, but in 2010, we had this...

Read the latest Blogs

Forums

Dancing Robot Goes Rogue

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Dancing Robot Goes Rogue

advice as i migrate my winscp based ssis pkg to our prod server

By stan

Hi , i installed winscp on my pc, added it to GAC thru vs...

Identities and Sequences II

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Identities and Sequences II

Visit the forum

Question of the Day

Identities and Sequences II

In thinking about the differences between the identity property and a sequence object, which of these two guarantees that there are consecutive numbers (according to the increment) inserted in a single table?

See possible answers