Azure Automation With Visual Studio Code
Microsoft combined the power of two powerful tools by announcing the public preview of Azure Automation Visual Studio Code Extension. This article will show you how to get started.
Microsoft combined the power of two powerful tools by announcing the public preview of Azure Automation Visual Studio Code Extension. This article will show you how to get started.
Get an introduction to the Stairway Series and learn about the power of the ScriptDOM library.
In this level of the Stairway to ScriptDOM, we examine the way the tool parses scripts and creates tokens from the text.
Learn how you can query for patterns in the Abstract Syntax Tree to analyze your code.
When a company assembles a lot of data to draw conclusions, that's great. However, when that one company sells data to a number of competitors, that can be a problem.
Information security, whether in databases, applications, or larger IT systems, is based on the principles of Authentication and Authorization, often referred to as AuthN and AuthZ respectively. Likewise, PostgreSQL security involves creating roles that allow access to server resources (AuthN) and then granting privileges to database objects appropriately (AuthZ). Understanding how each of these components work together is essential to effectively manage security in a PostgreSQL cluster.
During development, you'll occasionally need an undo script that drops a group of tables, or you might need to truncate a group of tables and then insert fresh data in order to run some tests. Unless you perform the required actions in the correct dependency order, you'll be tripped up by foreign key constraint violations. This article provides a SQL function that returns the list of tables in the correct dependency order.
Introduction This article shows how to script a basic merge between two tables, without using MERGE. This can be handy when you're merging a pair of tables with hundreds of columns, since the script doesn't know anything about them. This technique introduces and populates some auditing columns (IS_DELETED, IS_INSERTED, IS_UPDATED, TRANSACTION_DATE) for each record, and runs fast. […]
This article explores three key areas that need to be considered to make digital transformation occur: as a response to current changes, in preparation for future changes and to enhance the human experience. Read on to find out more!
By Steve Jones
I’ve often done some analysis of my year in different ways. Last year I...
By Steve Jones
This was Redgate in 2010, spread across the globe. First the EU/US Here’s Asia...
By John
Today is Christmas and while I do not expect anybody to actual be reading...
Comments posted to this topic are about the item Database security permissions save script
I have a SQL Agent job for backing up a set of Analysis Services...
Comments posted to this topic are about the item SQL Server 2025 Backup Compression...
I want to use the new BASE64_ENCODE() function in SQL Server 2025, but return a string that isn't large type. What is the longest varbinary string I can pass in and still get a varchar(8000) returned?
See possible answers