Agile on a Fixed Budget
Scott examines strategies for dealing with constraints that business stakeholders may put on software development teams.
Scott examines strategies for dealing with constraints that business stakeholders may put on software development teams.
Not every application needs a full-featured enterprise-scale database. In such cases, you can reduce costs and save resources by using a small-footprint database.
SQL Server MVP Simon Sabin brings us a very interesting article on a possibilltyfor using enumerated values instead of integer or other coded foreign keys. It is an interesting idea that could go a long way towards making code easier to read.
Part 7 of our "Developing a Complete SQL Server OLTP Database Project" discusses performance issues resulting from using EncryptByCert and DecryptByCert. Read the article and download the code to run the test yourself.
This article shows how to use DDL triggers to capture schema changes. This solutions works a little differently than most DDL triggers examples. This script captures the old object that was replaced.
If you're in the UK in October, you might want to sign up for the SQLBits Community day put on by MVP Simon Sabin.
Danny Gould has written a very interesting piece of software that gives you a view into the storage of your data inside SQL Server. And it's FREE!!! He brings us a description of this software in this short article.
This article shows how to use the SqlDataSource and AccessDataSource controls to query data from a relational database.
This article demonstrates how you can use Surface Area Configuration utility in order to modify some of the security-related settings that have been applied during installation of SQL Server 2005 Express Edition.
One of the more interesting new features with SQL Server 2005 is the native encryption built into the product. Expert SQL crpytographer, Michael Coles, brings us a look at the symmetric keys in SQL Server 2005 and how they can be used to encrypt data and be secured by a certificate.
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers