Analyzing Breached Data
After a recent data breach, Steve read about an analysis of the data. He has a few thoughts on the process that Troy Hunt went through to dig into the data.
After a recent data breach, Steve read about an analysis of the data. He has a few thoughts on the process that Troy Hunt went through to dig into the data.
Learn how you can recover a database that is in suspect mode.
Time is a valuable resource in your lives, and when you decide to tackle something, something else gets dropped.
What are the challenges to implementing a successful test data management strategy? In our recent webinar ‘Harnessing the Power of Test Data Management: Strategies for Success’, Redgate’s Steve Jones was joined by Hamish Watson (DevOps Consultant) and Daniel Watkins (Director/Principal Consultant) to talk all things TDM and how to implement it efficiently and effectively. Here are 10 key tips and takeaways from their conversation in a short blog post.
I’m not the first person to write about cleaning up unused or redundant indexes.
SQL Injection continues to be a problem and Steve has a few thoughts today on how to reduce your vulnerabilities.
To help mark Redgate’s 25th Birthday, the company has launched a new initiative to foster knowledge and skills in the data industry.
The goal of this tutorial is to enable ETL developers to obtain practical knowledge to exploit SSIS in transforming and combining data through hands-on exploration to be ready for real-world challenges in managing information.
A checklist can be helpful, but it needs to be more than a list of things if it's going to drive your career.
When choosing to hire someone, do you want experience or freshness? A few thoughts from someone that had to go through this recently.
By Steve Jones
A customer was testing Redgate Data Modeler and complained that it auto-generated PK names....
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
I have this data in a SQL Server 2025 table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers