SQL Server Threats
Is your SQL Server truly secure? Here are the top cyber threats targeting it. Learn how you can stop them before it strikes.
Is your SQL Server truly secure? Here are the top cyber threats targeting it. Learn how you can stop them before it strikes.
Learn how to connect to a PostgreSQL database from Python with this popular library.
In web app development company boardrooms, architects and engineers are debating old assumptions. Scaling up isn’t just about faster servers or better caching anymore. It’s about reshaping how systems think. CQRS (Command Query Responsibility Segregation) and Event Sourcing are no longer fringe ideas. They’re becoming default choices in high-concurrency systems where consistency, auditability, and performance […]
Overview In SQL Server, indexing is a technique used to improve the performance of queries by reducing the amount of data that SQL Server needs to scan. You can think of it like a table of contents in a book—it helps SQL Server find data more quickly. In this article, we will cover the following […]
Evolution of code The thing with any bit of code that has been around for a while, is that when change comes along, the tendency is to cater for the change by adding new stuff, while nothing gets taken away. Some stuff has definitely been taken away from this Date Dimension, but some historical artefacts […]
Introduction Sometimes we face the scenario in an enterprise environment that the database in SQL Server Always On Availability Group (AOAG) has high concurrency read and write access from application servers. If we keep using the one network interface card for both network traffic of database connections from application servers and database mirroring between AOAG […]
This Friday Steve Jones wonders about the upper limits for what you may learn in a year.
Helping people solve T-SQL problems is one of my favorite hobbies. Someone messaged me the other day with a complex query that was almost complete except for one issue. He needed to perform a LEFT OUTER JOIN but had to filter based on a value from the right table. However, when he added the filter, SQL removed rows from the left table. The task was to decide where to place the SQL predicate: in the ON or WHERE clause.
Steve has a few thoughts on the lack of data sovereignty in the cloud, with an outlook that isn't very positive.
Learn about delayed durability in SQL Server and how it might help you with a heavily loaded server.
2025 exposed a growing gap between AI ambition and operational reality. As budgets tightened...
By John
When organizations migrate workloads to Azure, the focus is usually on architecture, performance, and...
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
Comments posted to this topic are about the item The Max PK Length
Comments posted to this topic are about the item My experience using the GitHub...
Comments posted to this topic are about the item The Microsoft SQL Year in...
If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?
See possible answers