Articles

External Article

Overcoming Organization Challenges in Cloud Migration: A Webinar for Senior IT Leaders

Is your team looking to modernize and migrate your data but have questions about the complex organizational challenges? This webinar panel on June 29th covers all aspects of data modernization and migration that senior IT leaders should be aware of, including organization culture, communication, and politics. Why not send it to your boss?

2023-06-09

PostgreSQL 101: Getting started with PostgreSQL for SQL Server Developers (AEST and SGT Time Zones)

In the first two webinars, we've discussed why PostgreSQL has become such a force in recent years and some of the main differences for SQL Server users to know.
In this follow-up webinar, find out how to take your first steps using PostgreSQL.

Join Ryan Booz, PostgreSQL Advocate at Redgate, and discover:
-The freely available options to help you get started
-The essential tools you will need when using PostgreSQL
-Some learning resources to help you take the next steps

2023-06-07

External Article

PostgreSQL 101: Getting started with PostgreSQL for SQL Server Developers (CT and BST Time Zones)

In the first two webinars, we've discussed why PostgreSQL has become such a force in recent years and some of the main differences for SQL Server users to know.
In this follow-up webinar, find out how to take your first steps using PostgreSQL.

Join Ryan Booz, PostgreSQL Advocate at Redgate, and discover:
-The freely available options to help you get started
-The essential tools you will need when using PostgreSQL
-Some learning resources to help you take the next steps

2023-06-07

SQLServerCentral Article

MuleSoft Integration with Azure Key Vault

Introduction MuleSoft Anypoint is a platform that helps to aggregate and integrate data from different source systems. As part of the data integration, the MuleSoft Anypoint Environment needs source system and target system login credentials stored in the platform, making it a vulnerability. The storage is vulnerable to attacks from cyber-criminals. This vulnerability can arise […]

(3)

You rated this post out of 5. Change rating

2023-06-02

2,307 reads

Blogs

AI: Blog a Day – Day 7: Vector and Vector Databases

By

Continuing from Day 6 we learned Embeddings, Semantic Search and Checks, on Day 7...

AI: Blog a Day – Day 6: Embeddings – How AI Understands

By

Continuing from Day 5 where we covered notebooks, HuggingFace and fine tuning AI now...

The Book of Redgate: Mistakes

By

This is kind of a funny page to look at. The next page has...

Read the latest Blogs

Forums

Why End-User Testing Is Even More Important with AI

By dbakevlar

Comments posted to this topic are about the item Why End-User Testing Is Even...

Dynamic Unpivot

By pietlinden

I have a table I didn't design that has tons of repeating groups in...

Writing as an Art and a Job

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Writing as an Art and...

Visit the forum

Question of the Day

String Similarity II

What is the range for the result from the EDIT_DISTANCE_SIMILARITY() function in SQL Server 2025?

See possible answers