This article explores the 'shadow copy' and 'disk virtualization' services built into the Windows operating system and explains a basic solution demonstrating how the technology is used to copy the data and log files for a live SQL Server database into an 'image', from which we can create multiple, lightweight copies, or clones, of the original database.
Learn how indexes can help you with more than just querying data.
I’ve seen the SQL EXISTS keyword in Microsoft SQL Server T-SQL code and don’t understand it well. What does it do? How do I use it? Are there best practices around SQL IF EXISTS?
Learn how ledger databases and ledger tables work in SQL Server 2022.
Open offices have an interesting side effect: less collaboration.
VIEWs are an undervalued and underused feature in SQL. They basically consist of a query that has been given a name, and a parameter list, so can be used like an inline macro. Technically, you’re supposed to think of it as a virtual table.
Why do I love editorials, I can hear you asking. The answer is simple. It's all about opinions. I have opinions. Lots of them. Lots and lots of them. I'm flying home from Hong Kong after visiting a Redgate customer. They are doing amazing work.. It's so cool getting to see how people are solving […]
This article shows how to use Python to create a REST API for your application that developers can use to access the database.
Learning is fundamental in technology. Steve has a few thoughts on adopting a new technology at work.
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
By Steve Jones
etherness – n. the wistful feeling of looking around a gathering of loved ones,...
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
Comments posted to this topic are about the item The Max PK Length
Comments posted to this topic are about the item My experience using the GitHub...
Comments posted to this topic are about the item The Microsoft SQL Year in...
If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?
See possible answers