An Overview of PostgreSQL Window Functions
This article looks at Window functions and how they can be used to solve problems in a different way from standard aggregate functions.
This article looks at Window functions and how they can be used to solve problems in a different way from standard aggregate functions.
There's a common party question about which 5 people would you invite to a dinner party? Often this is amended to include living or dead people, and it's often interesting to hear people tell you who they'd invite and why. Since most of the people reading this work in technology in some way, I was […]
This article illustrates how to use an SSIS external configuration file to enable the properties of package objects to be dynamically updated at run time.
From castles and dragons to swordfights and spells, this year’s SQL Bits will have it all. Make sure you don’t miss out on our great sessions, from Code Errors to Reliable Releases, to adding some PostgreSQL skills to your repertoire. And come say “hi” to us at the Redgate booth, where we’ll have some news for you. Get 10% off registering with 10REDGATE.
Microsoft combined the power of two powerful tools by announcing the public preview of Azure Automation Visual Studio Code Extension. This article will show you how to get started.
Get an introduction to the Stairway Series and learn about the power of the ScriptDOM library.
In this level of the Stairway to ScriptDOM, we examine the way the tool parses scripts and creates tokens from the text.
Learn how you can query for patterns in the Abstract Syntax Tree to analyze your code.
When a company assembles a lot of data to draw conclusions, that's great. However, when that one company sells data to a number of competitors, that can be a problem.
Information security, whether in databases, applications, or larger IT systems, is based on the principles of Authentication and Authorization, often referred to as AuthN and AuthZ respectively. Likewise, PostgreSQL security involves creating roles that allow access to server resources (AuthN) and then granting privileges to database objects appropriately (AuthZ). Understanding how each of these components work together is essential to effectively manage security in a PostgreSQL cluster.
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
By Steve Jones
I had an idea for an animated view of a sales tool, and started...
Hi all, I'm trying to do classic scenario for loading multiple Excel files into...
Hi So the case statement is slowing this down - but for the life...
I need to delete rows from both the temporal main and history tables. The...
In SQL Server 2025, what is returned by this code:
SELECT EDIT_DISTANCE('tim', 'tom')
Assume preview features are enabled. See possible answers