Changing Edge Security
Security is changing, and the "edge" of where we need to protect data is changing as well.
Security is changing, and the "edge" of where we need to protect data is changing as well.
In this installment of the Stairway to Integration Services, Andy Leonard shows you how to execute packages synchronously or asynchronously.
How to create a batch file that executes any number of database migration tasks across a range of servers and databases, using Flyway.
In this article we walk through an example of using Power Query to transform source data that can be used in a Power BI report.
Introduction This article will help you install the Docker Desktop for Mac. Before we show that, let us start by understanding what the Docker Desktop software can do for you. To understand Docker, we need to understand what a container is. If you remember a few years ago, the only way of deploying application code […]
In this article we look at the steps to recover a deleted TDE key that is being used by Azure SQL Database for database encryption.
In this article, Shel Burkow uses the SQL execution plan from the previous article to write a program in Scala.
Using data scraped from the web might be convenient, but is it legal. Perhaps more importantly, is it moral? Steve has a few thoughts.
Introduction This article shows how common table expressions (CTE) in SQL Server are naturally suited for navigating trees, such as finding its longest path, or diameter. Recall that a tree is an undirected graph where unique paths exist between any two nodes (i.e. vertices). Any node may be selected as its top node, with its […]
By Steve Jones
I do believe that Redgate has been very customer focused since it’s inception. I’ve...
By gbargsley
It's 2 AM. Your phone is going off. Users can't connect to the application,...
By Steve Jones
I discovered a procedure recently that I wasn’t aware of: sp_sequence_get_range. This post looks...
When preparing documents for immigration in Malaysia, accuracy and compliance are essential. Working with...
Comments posted to this topic are about the item Let's Talk Community Events!
Hi as shown below a replication target requires a primary key. if we want...
By default, how often is the SQL Server Database Engine checking for deadlocks?
See possible answers