Additional Articles


External Article

Documenting Your PowerShell Binary Cmdlets

Whereas it is easy to provide inline documentation for a normal scripted PowerShell cmdlet or function so as to provide comprehensive help at the command-line or IDE, the same isn't true of binary cmdlets written in C#. At last, there is an open-source utility to assist with this that is being actively maintained and updated. At last, binary cmdlets need no longer be the poor cousins of scripted cmdlets in their documentation

2016-01-18

3,322 reads

External Article

Wherever I Lay My Hat: Release Management in TeamCity with Redgate DLM

Where you have multiple services, applications and databases in your environment, and perhaps with high levels of scrutiny and governance, you'll probably want a Release Management system for deploying database and application code together: You can, alternatively, use a separate Release Management component. But for simpler applications, you can use your existing build system such as TeamCity to deploy changes. Using a database deployment example, Richard Macaskill shows how.

2016-01-15

3,536 reads

External Article

Declarative SQL: Using References

There are several ingenious ways of using SQL References to enforce integrity declaratively. Declarative Referential Integrity (DRI) is more effective than using procedural code in triggers, procedures or application layers because it uses the SQL paradigm, thereby making optimisation easier and providing clearer expression of the rules underlying the data. Joe Celko explains.

2016-01-12

6,270 reads

External Article

JSON support in SQL Server 2016

At last, SQL Server has caught up with other RDBMSs by providing a useful measure of JSON-support. It is a useful start, even though it is nothing like as comprehensive as the existing XML support. For many applications, what is provided will be sufficient. Robert Sheldon describes what is there and what isn't.

2016-01-07

9,007 reads

External Article

Exploration of SQL Server 2016 Always Encrypted – Part 2

It is important to only allow authorized individuals access to confidential data. Therefore when setting up an Always Encrypted table it is important to consider splitting configuration tasks between multiple individuals/groups to improve security. Follow Greg Larsen as he shows how to setup up SQL Server Always Encrypted tables where database administrators can’t see the clear text confidential data.

2016-01-06

4,919 reads

Blogs

A New Word: Dolorblindness

By

dolorblindness – n. the frustration that you’ll never be able to understand another person’s...

Claude Code Helps Analyze Test Data Manager Log Files

By

I had a customer ask about analyzing their Test Data Manager (TDM) usage to...

PowerPoint to HTML with Claude AI

By

I had an idea for an animated view of a sales tool, and started...

Read the latest Blogs

Forums

GPX distance and time analysis in SQL Server

By Cláudio Tereso

Comments posted to this topic are about the item GPX distance and time analysis...

The DBA is Dead; Long Live the DBA

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The DBA is Dead; Long...

Changing the AG Listener

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Changing the AG Listener

Visit the forum

Question of the Day

Changing the AG Listener

In SQL Server 2025, if I want to remove an IP from a listener, what do I do?

See possible answers