Joe Celko reminisces about the origins of databases and one of the early pioneers, Charles Bachman. He explains how pointer chains were used to traverse data in the NDL standard and referential integrity that we use today.
Developers need to consider not only system performance when writing code, but also how readability impacts code maintenance.
Nat Sundar explains the different ways to load JSON data into SQL Server, along the way also covering the use OpenRowset and OpenJSON functions to manage JSON data effectively.
Governments are requiring better security, and Steve wishes the US would follow.
Describe and provide a set-based method that takes a multiple character split term and returns as a table
When using Transparent Data Encryption, you might wonder “What is the state of my transparent data encrypted database?” Read on to learn the many different states that a transparent data encrypted database might go through.
TEMPDB Enhancements in SQL Server 2016 - By default enforced to follow best practices.
The key challenge for application developers is to build a foolproof system to ensure data security. This is not only more intense, but more complex these days, as many organizations are planning to move their applications to the cloud. Read on to learn more.
By Steve Jones
Thanks to everyone for attending my session on running a Local LLM. If you...
By Steve Jones
I do believe that Redgate has been very customer focused since it’s inception. I’ve...
By James Serra
There’s a question I’ve been hearing more and more lately, especially as Copilot, Fabric,...
Hi everyone I am getting below warning when I run SSIS: Warning: 0x80049304 at...
Comments posted to this topic are about the item Let's Talk Community Events!
Hi as shown below a replication target requires a primary key. if we want...
By default, how often is the SQL Server Database Engine checking for deadlocks?
See possible answers