An Overview of PostgreSQL Window Functions
This article looks at Window functions and how they can be used to solve problems in a different way from standard aggregate functions.
This article looks at Window functions and how they can be used to solve problems in a different way from standard aggregate functions.
There's a common party question about which 5 people would you invite to a dinner party? Often this is amended to include living or dead people, and it's often interesting to hear people tell you who they'd invite and why. Since most of the people reading this work in technology in some way, I was […]
This article illustrates how to use an SSIS external configuration file to enable the properties of package objects to be dynamically updated at run time.
From castles and dragons to swordfights and spells, this year’s SQL Bits will have it all. Make sure you don’t miss out on our great sessions, from Code Errors to Reliable Releases, to adding some PostgreSQL skills to your repertoire. And come say “hi” to us at the Redgate booth, where we’ll have some news for you. Get 10% off registering with 10REDGATE.
Microsoft combined the power of two powerful tools by announcing the public preview of Azure Automation Visual Studio Code Extension. This article will show you how to get started.
Get an introduction to the Stairway Series and learn about the power of the ScriptDOM library.
In this level of the Stairway to ScriptDOM, we examine the way the tool parses scripts and creates tokens from the text.
Learn how you can query for patterns in the Abstract Syntax Tree to analyze your code.
When a company assembles a lot of data to draw conclusions, that's great. However, when that one company sells data to a number of competitors, that can be a problem.
Information security, whether in databases, applications, or larger IT systems, is based on the principles of Authentication and Authorization, often referred to as AuthN and AuthZ respectively. Likewise, PostgreSQL security involves creating roles that allow access to server resources (AuthN) and then granting privileges to database objects appropriately (AuthZ). Understanding how each of these components work together is essential to effectively manage security in a PostgreSQL cluster.
By HeyMo0sh
As a DevOps person, I know that to make FinOps successful, you need more...
By HeyMo0sh
As someone who works in DevOps, I’m always focused on creating systems that are...
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
Comments posted to this topic are about the item Restoring On Top II
Comments posted to this topic are about the item SQL Art 2: St Patrick’s...
Comments posted to this topic are about the item Breaking Down Your Work
I have a database, DNRTest, that has a number of tables and other objects in it. The other day, I was trying to mock up a test and ran this code on the same server:
-- run yesterday CREATE DATABASE DNRTest2 GO USE DNRTest2 GO CREATE TABLE NewTable (id INT) GOToday, I realize that I need a copy of DNRTest for another mockup, and I run this:
-- run today USE Master BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO RESTORE DATABASE DNRTest2 FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens? See possible answers