Articles

External Article

Overcoming Organization Challenges in Cloud Migration: A Webinar for Senior IT Leaders

Is your team looking to modernize and migrate your data but have questions about the complex organizational challenges? This webinar panel on June 29th covers all aspects of data modernization and migration that senior IT leaders should be aware of, including organization culture, communication, and politics. Why not send it to your boss?

2023-06-09

PostgreSQL 101: Getting started with PostgreSQL for SQL Server Developers (AEST and SGT Time Zones)

In the first two webinars, we've discussed why PostgreSQL has become such a force in recent years and some of the main differences for SQL Server users to know.
In this follow-up webinar, find out how to take your first steps using PostgreSQL.

Join Ryan Booz, PostgreSQL Advocate at Redgate, and discover:
-The freely available options to help you get started
-The essential tools you will need when using PostgreSQL
-Some learning resources to help you take the next steps

2023-06-07

External Article

PostgreSQL 101: Getting started with PostgreSQL for SQL Server Developers (CT and BST Time Zones)

In the first two webinars, we've discussed why PostgreSQL has become such a force in recent years and some of the main differences for SQL Server users to know.
In this follow-up webinar, find out how to take your first steps using PostgreSQL.

Join Ryan Booz, PostgreSQL Advocate at Redgate, and discover:
-The freely available options to help you get started
-The essential tools you will need when using PostgreSQL
-Some learning resources to help you take the next steps

2023-06-07

SQLServerCentral Article

MuleSoft Integration with Azure Key Vault

Introduction MuleSoft Anypoint is a platform that helps to aggregate and integrate data from different source systems. As part of the data integration, the MuleSoft Anypoint Environment needs source system and target system login credentials stored in the platform, making it a vulnerability. The storage is vulnerable to attacks from cyber-criminals. This vulnerability can arise […]

(3)

You rated this post out of 5. Change rating

2023-06-02

2,306 reads

Blogs

ADF Pipeline Debugging Fails with BadRequest – The Sequel

By

A while ago I blogged about a use case where a pipeline fails during...

Why I stopped using MCP for AI coding stuff

By

Something has shifted quietly in 2026. The developers I know/respect—the ones actually shipping, not...

AI: Blog a Day – Day 5: Notebooks, Hugging face models and Fine Tuning

By

Continuing from Day 4 where we learned Encoder, Decoder, and Attention Mechanism, today we...

Read the latest Blogs

Forums

Dynamic Unpivot

By pietlinden

I have a table I didn't design that has tons of repeating groups in...

Writing as an Art and a Job

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Writing as an Art and...

String Similarity II

By Steve Jones - SSC Editor

Comments posted to this topic are about the item String Similarity II

Visit the forum

Question of the Day

String Similarity II

What is the range for the result from the EDIT_DISTANCE_SIMILARITY() function in SQL Server 2025?

See possible answers