Additional Articles


External Article

Time Slots - An Essential Extension to Calendar Tables

After answering many forum entries from developers asking for help with dealing with SQL that involved time intervals and ranges, Dwain dreamed of a generalized tool that sets up time slots of various sorts without the need to experiment; that could do the heavy lifting, so that developers could do aggregations and reports based on time intervals without the hard graft. Here is Dwain's dream made reality.

2015-05-05

7,291 reads

Technical Article

MongoDB vs. Azure DocumentDB

There’s a new kid on the block in the NoSQL world – Azure DocumentDB. Released in preview back in August 2014 and going Generally Available this month, Azure DocumentDB is Microsoft’s initial foray into the increasingly competitive space of non-relational database management systems. Of course there is no better competitor in this space to measure up against than MongoDB. How close does DocumentDB stack up to MongoDB? Are they even close?

2015-05-04

9,575 reads

External Article

CONCAT and STUFF Functions in SQL Server 2012

The difference between the CONCAT function and the STUFF function lies in the fact that CONCAT allows you to append a string value at the end of another string value whereas STUFF allows you insert or replace a string value into or in between another string value. Read on to learn more about these functions and their real life usage.

2015-05-01

9,908 reads

External Article

Microservices in Promise and Practice

Are microservices the cure for the ague of monolithic applications, or do they bring their own problems with them that monolithic architectures have circumvented? Are they capable of delivering applications that are easier to maintain and develop? How can they avoid the failings of service-oriented architectures? Once more, Robert Sheldon gets to the heart of the technical issues.

2015-04-30

7,853 reads

External Article

Disaster Recovery and Big Data

Big data applications are not usually considered mission-critical: while they support sales and marketing decisions, they do not significantly affect core operations such as customer accounts, orders, inventory, and shipping. Why, then, are major IT organizations moving quickly to incorporating big data in their disaster recovery plans?

2015-04-29

9,397 reads

External Article

Schema-Based Access Control for SQL Server Databases

Access-control within the database is important for the security of data, but it should be simple to implement. It is easy to become overwhelmed by the jargon of principals, securables, owners, schemas, roles, users and permissions, but beneath the apparent complexity, there is a schema-based system that, in combination with database roles and ownership-chaining, provides a relatively simple working solution.

2015-04-22

6,866 reads

Blogs

Flyway Tips: AI Generating Migration Script Names

By

AI is a big deal in 2026, and at Redgate, we’re experimenting with how...

The Book of Redgate: Get the right stuff done

By

Another of our values: The facing page has this quote: “We admire people who...

Runing tSQLt Tests with Claude

By

Running tSQLt unit tests is great from Visual Studio but my development workflow...

Read the latest Blogs

Forums

No Defaults Passwords Ever

By Steve Jones - SSC Editor

Comments posted to this topic are about the item No Defaults Passwords Ever

Introduction of OPTIMIZE_FOR_SEQUENTIAL_KEY = ON

By saum70

Hi, We have low latency high volume system. I have a table having 3...

The Long Name

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Long Name

Visit the forum

Question of the Day

The Long Name

I run this code to create a table:Create table with unicode nameWhen I check the length, I get these results:Table with length of name shown as 132 charactersA table name is limited to 128 characters. How does this work?

See possible answers