Free and Cool - MP3
Two big events this week captured Steve Jones' attention. A little MySQL and Apple commentary to break up the week.
Two big events this week captured Steve Jones' attention. A little MySQL and Apple commentary to break up the week.
Two big events this week captured Steve Jones' attention. A little MySQL and Apple commentary to break up the week.
SQL Server 2005 Express Edition's small footprint and free-of-charge use has some negative implications, imposing restrictions on functionality available in the Standard or Enterprise editions. This is especially conspicuous in the case of replication, which we will explore starting with this installment.
Find why SQL Server clustered index design should be narrow and static and how clustered indexes affect many-to-many tables to improve database performance.
Reporting Services has been greatly enhanced in SQL Server 2005 and become an integral tool in many SQL Server installations. Longtime autor Raj Vasant brings us an example of how you can enhance your reports with custom coded DLLs called from within the reporting engine.
How do you decide who gets hired? Do you get the best candidate? Steve Jones says that most of us don't necessarily hire the best person that applies for a variety of reasons.
This 3-part sponsored article surveys several different methodologies for database development, examines their strengths and weaknesses, and illustrates how Red Gate's comparison tool, SQL Compare, can be incorporated into each model.
Longtime SQL Server guru David Poole brings us a look at one of the thorny problems a DBA faces: tracking down illicit users.
Application locks aren't a well known area of locking in SQL Server, but they can be very useful for special scenarios. They work in an analogous way to the lock() construct in .Net and are basicaly user defined mutexes in SQL Server.
The amount of data in the world grows every day and there's no end in sight. How big a problem is storage management? Steve Jones shares a few thoughts on how you might manage your storage.
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers