Administration

SQLServerCentral Article

SQL Server Security Part 2

  • Article

In part one Chris Kempster covered a variety of security recommendations primarily for production systems. In Part two of this series he continues to explore security at a variety of levels where you may not realize you are vulnerable.

(1)

You rated this post out of 5. Change rating

2019-10-04 (first published: )

35,416 reads

SQLServerCentral Article

Snapshot Replication for the Beginner

  • Article

Andy continues writing about replication, this week discussing the many options available when creating a snapshot publication. As we noted on his last article, this one may take longer than usual to load due the large number of images but we think the readability of having it all one page is worth while.

(1)

You rated this post out of 5. Change rating

2004-01-27

12,803 reads

Blogs

Resetting on the AI hype train

By

There's a great article from MIT Technology Review about resetting on the hype of...

A New Word: Etherness

By

etherness – n. the wistful feeling of looking around a gathering of loved ones,...

Vibe Coding a Login Tracking System

By

A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...

Read the latest Blogs

Forums

The Max PK Length

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Max PK Length

My experience using the GitHub Copilot in SSMS 22

By Daniel Calbimonte

Comments posted to this topic are about the item My experience using the GitHub...

The Microsoft SQL Year in Review

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Microsoft SQL Year in...

Visit the forum

Question of the Day

The Max PK Length

If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?

See possible answers