Visual Studio turns 20 – how are you celebrating?

The following are just some of the anecdotes from Redgaters here at Redgate HQ when I asked them for their reflections on 20 years of Visual Studio. Almost all of our developers use Visual Studio every day, so there are a lot of memories to share: I’ve been using Visual Studio since VS6, 15 years... read more

A glimpse into the culture of our software development teams

When anyone visits Redgate HQ in Cambridge and takes a tour of the software development teams, their reaction is invariably the same. They’re surprised at the dress code (we don’t have one), they’re mystified by the walls plastered with Post-it notes, and they’re intrigued by the giant bean bags and cake everywhere. That’s the... read more

DevOps – a DBA’s perspective

Earlier this year, we ran a DevOps 101 webinar in conjunction with Redgate to a predominately DBA audience. In this blog post our own DevOpsGuys DBA, Paul Ibison, gives his views on what DevOps means from a DBA perspective. Note that Paul is a SQL Server DBA, so some of the comments are specific... read more

Getting started with SQL Doc and PowerShell

SQL Doc keeps everyone in the development team informed about a database. It provides more information than what it is source control, including server settings, and it formats and color-codes the information so that it is as easy to read as possible. It generates the source of all of the metadata of a database,... read more

SQL Clone and backups protected with TDE – part 2

My last article demonstrated that you can use SQL Clone to make a copy of a live database, even when that database is protected with Transparent Data Encryption (TDE). However, not everyone will want to use SQL Clone against a live database, especially a production database. Fortunately, SQL Clone allows you to build an... read more

SQL Clone and databases protected with TDE – part 1

SQL Clone is designed to make it easy to provision copies of a database for development and test environments in seconds. Often, these ‘clones’ are copies of production databases, which contain sensitive data that needs to be protected from unauthorized access. Transparent Data Encryption (TDE) is one technique that many organizations have implemented in... read more