The Endless Upgrade Cycle
Steve Jones notes that security can be a reason to upgrade your systems, but it can also result in an endless cycle.
2014-03-26
113 reads
Steve Jones notes that security can be a reason to upgrade your systems, but it can also result in an endless cycle.
2014-03-26
113 reads
Schemas may be largely irrelevant to small databases, where it is no trouble to assign permissions to individual objects, but they are vital for a hard working corporate database that is being actively developed and used by several applications, with thousands of objects that must be assigned the correct permission.
2014-03-24
213 reads
This Friday Steve Jones wants you to look back and cringe a bit. Share with the rest of the community what a bad day was for you and see if it was really as bad as you think.
2018-02-02 (first published: 2014-03-21)
245 reads
Much of the data collected by companies is being sold for profit. This data isn't treated well and while not much may change, perhaps we should be aware of how we handle data as professionals.
2014-03-20
95 reads
2014-03-19
468 reads
2017-12-19 (first published: 2014-03-18)
492 reads
How many passwords do you have? Steve Jones has a lot and while he notes there are some new ways for us to authorize ourselves for servers, they aren't necessarily making things more secure or less complex.
2014-03-17
137 reads
Many people have been unsure of cloud computing and what it means for your particular application. Steve Jones notes there's a great new demo that can help you get started exploring the Azure offerings.
2014-03-17
170 reads
The #sqlhelp hashtag on Twitter is a great way to interact with the SQL Server community and get help.
2014-03-13
237 reads
A survey of developers on Stack Overflow has some interesting results that Steve Jones notes. Some of them might just impact our careers as data professionals.
2014-03-11
298 reads
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers