Reteaming
Many organizations will change their teams around over time, but not all do this regularly. Steve talks about how Redgate does this every year.
Many organizations will change their teams around over time, but not all do this regularly. Steve talks about how Redgate does this every year.
Robert Sheldon demonstrates how to start automating data comparisons between two databases, from the Windows command line or PowerShell. With a single command, you can easily compare and sync data such as test data sets, or static data used for reference or lookup purposes.
Learn about the core SQL Server concepts to build your skill set including the architecture, database design, development, administration and more.
Introduction Relational database design helps to create a set of relations and tables, which are connected with each other through some defined relationships. The main purpose of relational database design is to preserve the information and minimize data redundancy. We need to follow some design guidelines for relational schemas to maintain the quality of the […]
In this article of the series, Pamela Mooney explains the architecture of SQL Server under the hood, including some query anti-patterns to avoid.
Introduction In my last article, Discussion on Normalization and Database Design Concepts, I discussed about the normalization concepts. Here, I will take one table in SQL Server and implement different normal forms. As we move up the higher normal forms, we end up on more number of tables. Implementation of Normal Forms Let us start […]
When working on an SSIS project with multiple developers, a merge conflict can occur in the git repository. In this tip we'll show you how to resolve this type of conflict and provide alternative options.
Making sure your SQL Servers are secured against malicious users is difficult. The United States Defense Information Systems Agency (DISA) publishes a set of guidelines for organizations securing different pieces of software that connect to the US Department of Defense’s networks (DoD). Whether you’re working with the DoD or not, these Security Technical Implementation Guides (STIGs) are a good resource to help you understand potential security vulnerabilities and mitigate them.
By Steve Jones
AI is a big deal in 2026, and at Redgate, we’re experimenting with how...
By Steve Jones
Another of our values: The facing page has this quote: “We admire people who...
By Ed Elliott
Running tSQLt unit tests is great from Visual Studio but my development workflow...
Hi, We have low latency high volume system. I have a table having 3...
Comments posted to this topic are about the item The Long Name
Comments posted to this topic are about the item Eight Minutes
I run this code to create a table:
When I check the length, I get these results:
A table name is limited to 128 characters. How does this work?