Will employee data become a target of hackers? It's likely more a movie plot than reality, at least, Steve hopes so.
In this article, the second in the series, Robert Sheldon demonstrates how to manage the SQL Server security with granting permissions to users, logins, and groups.
Learn about how selecting a SQL Server index fill factor can impact storage and performance. Check out the included scripts to help give you better insight.
A company is letting companies trade vacation for payments against student loan debt.
Article shows how R Services can help database administrators with their daily work
Distributed source control is really intimidating: branches, pull requests, merges – will somebody just take my code, for crying out loud? Why does it have to be so complicated and involved?
No matter what the reason you have sensitive information, you need to treat it carefully.
Most organizations today understand the value of analysing their data. In some cases, they haven’t realized the value or are just getting started. This article, by Data Platform MVP Gogula Aryalingam, describes how analytics can start small – with just one Power BI dashboard – and grow from there.
By alevyinroc
Ten years (and a couple jobs) ago, I wrote about naming default constraints to...
By Steve Jones
We have multiple teams (8) working on Redgate Monitor. Some work on the Standard...
By HeyMo0sh
Learning any kind of theory is easy, but adapting FinOps and watching it rescue...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item The Problem Isn't Always Your...
Comments posted to this topic are about the item Identity Defaults
What happens when I run this code?
CREATE TABLE dbo.IdentityTest
(
id int IDENTITY(10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
See possible answers