2025-08-07
1,968 reads
2025-08-07
1,968 reads
Is your SQL Server truly secure? Here are the top cyber threats targeting it. Learn how you can stop them before it strikes.
2025-09-02 (first published: 2025-08-07)
2,611 reads
TEXT, NTEXT, and IMAGE columns have been deprecated for nearly two decades, yet they still silently haunt many SQL Server environments. This article explains their hidden limitations with practical demos and shows why migrating to VARCHAR(MAX), NVARCHAR(MAX), and VARBINARY(MAX) is critical for modern performance, maintainability, and future upgrades.
2025-09-02 (first published: 2025-08-06)
1,892 reads
In web app development company boardrooms, architects and engineers are debating old assumptions. Scaling up isn’t just about faster servers or better caching anymore. It’s about reshaping how systems think. CQRS (Command Query Responsibility Segregation) and Event Sourcing are no longer fringe ideas. They’re becoming default choices in high-concurrency systems where consistency, auditability, and performance […]
2025-09-02 (first published: 2025-08-06)
437 reads
2025-08-06
1,844 reads
Agentic AI is often hailed as a game-changer by organizations, bringing autonomous decision-making, intelligent automation, and powerful predictive capabilities. However, as organizations rush to leverage these technologies, those dealing with critical data in relational databases, documents and datasets, especially personally identifiable information (PII) face a harsh reality: moving AI projects from proof-of-concept to production is […]
2025-08-06
146 reads
Evolution of code The thing with any bit of code that has been around for a while, is that when change comes along, the tendency is to cater for the change by adding new stuff, while nothing gets taken away. Some stuff has definitely been taken away from this Date Dimension, but some historical artefacts […]
2025-09-02 (first published: 2025-08-05)
2,950 reads
2025-08-05
1,807 reads
Page splits are an often-overlooked performance killer in SQL Server. In this article, we take a forensic look at how serial inserts differ from mid-table inserts, revealing why inserting rows out of order causes hidden page splits, increased IO, and fragmentation. Using a wide-column table, we demonstrate both scenarios and decode their impact with page-level analysis.
2025-09-02 (first published: 2025-08-05)
2,331 reads
When you run a CI/CD pipeline, you often need confidential values like passwords, authentication tokens, service principal secrets etc. when you want to deploy a certain artefact. You don’t want to store those secrets directly in your pipelines as this might pose a considerable security leak. Instead, you either store them as secret variables, or […]
2025-09-02 (first published: 2025-08-04)
424 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
Hi, our peer who owns a remote mysql server from which we extract warehouse...
What is returned as a result set when I run this command without a new seed value?
See possible answers