SSIS Bad Habits: Decreasing SSIS Package Performance
This tip will explain some mistakes SSIS developers usually make when designing ETL and how they should be avoided to help improve performance.
2022-12-19
This tip will explain some mistakes SSIS developers usually make when designing ETL and how they should be avoided to help improve performance.
2022-12-19
This article covers how to deploy, configure and test the managed instance version of Azure SQL Database using the General-Purpose edition.
2022-12-16
Flyway Desktop is the newest way to automate database deployments. In this brand new course Kathi Kellenberger provides an overview of DevOps, including definitions, tools, and demos of some of the advanced features available in Flyway Desktop.
2022-12-16
In this article, I focus exclusively on the DELETE statement to help round out our discussion on the core DML statements in MySQL. Overall, the DELETE statement is fairly basic, but one that’s no less necessary to have in your arsenal of DML tools.
2022-12-14
This article demonstrates how, once armed with the file path locations of all the scripts, you can use PowerShell to search them for various purposes such to review them for potentially disruptive changes, or run code quality checks, or to verify documentation standards.
2022-12-14
In this article, we will look at how to use an Azure Databricks Workspace to explore Hive tables using Spark SQL along with several examples.
2022-12-12
However chaotic or predictable your DevOps processes currently are, the new video learning pathway from the Redgate University will help you prioritize what to improve first, provide step-by-step guidance on how to implement those improvements, and show you ways to measure them. Start learning.
2022-12-12
Every enterprise is now facing the same challenge: to do more with less in a demanding economic environment. They're expected to release value to customers sooner while at the same time controlling the costs of their infrastructures, retaining skilled staff, and reducing risk. What role does the database play in balancing this challenge? Read on to find out.
2022-12-09
409 reads
2022-12-09
480 reads
This is the first of two articles to describe the principles and practicalities of masking data in databases. It explains why an organization sometimes needs masked data, the various forms of masked data we can use, the sort of data that needs to be masked, and the potential pitfalls.
2022-12-07
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
By Steve Jones
etherness – n. the wistful feeling of looking around a gathering of loved ones,...
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
Comments posted to this topic are about the item The Max PK Length
Comments posted to this topic are about the item My experience using the GitHub...
Comments posted to this topic are about the item The Microsoft SQL Year in...
If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?
See possible answers