2025-04-07
1,682 reads
2025-04-07
1,682 reads
2022-05-25
487 reads
2017-05-01 (first published: 2017-04-19)
1,177 reads
In this article, Thomas Knight analyzes and critiques the design of, and experience with, the "dual-level" user security in SQL Server. He then demonstrates a better theoretical alternative.
2014-02-04
4,362 reads
This script will either reoprt or 'fix' lost or orphaned users after restore for all versions of SQL.
2010-02-24 (first published: 2010-02-04)
2,247 reads
This script basically retreives all database users thier database roles for a database.
2010-02-10 (first published: 2010-01-20)
3,484 reads
By DataOnWheels
Ramblings of a retired data architect Let me start by saying that I have...
By Steve Jones
A customer was testing Redgate Data Modeler and complained that it auto-generated PK names....
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
Hi everyone, Below is a consolidated summary of what we validated Architecture & data...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
I have this data in a SQL Server 2025 table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers