I’m inordinately proud to work for Redgate Software. One of the biggest reasons for my pride is because I can say, without equivocation, we make fantastic software that will help you do your job better, easier, and faster. However, there was one piece of software, many years ago now, that…Read more
Learn about the different types of database constraints and how they ensure data consistency. View examples in Redgate Data Modeler’s web-based design tool.Read more
We now have ever-expanding digital identities to live our daily lives and, whether it’s crossing international borders or more innocuously buying basic products and services, our digital footprint is growing. With the increasing requirement to have a digital identity to do just about anything, our data is constantly being shared…Read more
What is DevOps and how should organizations introduce it? In this series of articles, we talk to DevOps thought leaders who are leading the way in implementing advanced software development practices like DevOps for database as well as application development. What are the challenges they’ve faced, how have they overcome…Read more
Join any conversation about cybersecurity in Australia and the Essential Eight Maturity Model may well be mentioned. Introduced in 2017 by the Australian Cyber Security Centre (ACSC), its purpose is to help non-corporate Commonwealth entities (NCEs) minimise the risk of cyber attacks by following eight mitigation strategies in three key…Read more