2020-02-19 (first published: 2019-03-14)
466 reads
2020-02-19 (first published: 2019-03-14)
466 reads
Database encryption is hard, and somewhat controversial. Steve thinks we ought to do a better job of it.
2019-03-13
72 reads
Technical debt can cripple software development, much like financial debt hurts individuals and organizations. Steve wants to know if you measure your debt today.
2019-03-12
104 reads
Phil Factor argues that very few processes, even in well-established businesses, mimic the dreamy clarity and autonomy of a microservice.
2019-03-11
153 reads
The point of this article is that only service accounts and/or specific network sql admin accounts should have sysadmin rights.
2019-03-11
1,509 reads
We sometimes need to think differently about different situations. Steve notes that we might approach the way we solve problems in new ways.
2019-03-08
176 reads
2019-03-07
98 reads
Google and Microsoft have plans for dealing with data incidents. Steve thinks you should as well.
2019-03-06
69 reads
It seems that many companies are implementing AI into their systems. Steve notes that this isn't always a good idea.
2019-03-05
85 reads
2019-03-04
104 reads
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
By Steve Jones
etherness – n. the wistful feeling of looking around a gathering of loved ones,...
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
Comments posted to this topic are about the item The Max PK Length
Comments posted to this topic are about the item My experience using the GitHub...
Comments posted to this topic are about the item The Microsoft SQL Year in...
If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?
See possible answers