Complex Constrained Security
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
62 reads
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
62 reads
Disaster recovery planning can be hard, and we often forget about some of the non technical issues.
2019-02-05
65 reads
2019-02-04
78 reads
2019-02-04
1,156 reads
Steve is looking for entertainment suggestions after the Oscar nominations were released.
2019-02-01
59 reads
2020-01-22 (first published: 2019-01-31)
400 reads
2019-01-30
3,056 reads
2019-01-29
112 reads
From the time you rise in the morning until you close your eyes at night, your day is filled with thousands of small decisions, many that you don’t even think about. For each decision that you make, there is a probably a good choice and a poor choice available. Most of the time, the good […]
2019-01-28
139 reads
2019-01-28
125 reads
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
By Steve Jones
etherness – n. the wistful feeling of looking around a gathering of loved ones,...
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
Comments posted to this topic are about the item The Max PK Length
Comments posted to this topic are about the item My experience using the GitHub...
Comments posted to this topic are about the item The Microsoft SQL Year in...
If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?
See possible answers