Complex Constrained Security
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
62 reads
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
62 reads
Disaster recovery planning can be hard, and we often forget about some of the non technical issues.
2019-02-05
65 reads
2019-02-04
78 reads
2019-02-04
1,162 reads
Steve is looking for entertainment suggestions after the Oscar nominations were released.
2019-02-01
59 reads
2020-01-22 (first published: 2019-01-31)
400 reads
2019-01-30
3,058 reads
2019-01-29
112 reads
From the time you rise in the morning until you close your eyes at night, your day is filled with thousands of small decisions, many that you don’t even think about. For each decision that you make, there is a probably a good choice and a poor choice available. Most of the time, the good […]
2019-01-28
140 reads
2019-01-28
125 reads
By DataOnWheels
Ramblings of a retired data architect Let me start by saying that I have...
By Steve Jones
A customer was testing Redgate Data Modeler and complained that it auto-generated PK names....
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
Hi everyone, Below is a consolidated summary of what we validated Architecture & data...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
I have this data in a SQL Server 2025 table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers