SQL Clone permissions give you simple control over who can access SQL Clone, and what they can do with it. Read more
Richard Macaskill describes a lightweight copy-and-generate approach for making a sanitized database build available to development teams, using SQL Clone, SQL Change Automation and SQL Data Generator. Read more
Can we use a striped backup as the source for a SQL Clone image? Yes we can! Read more
How is it possible that the cloned databases could be so small and lightweight, and yet behave exactly like any normal database, complete with all the data? It sounds like magic, but it's not. It simply makes clever use of native Windows virtualization technology. Read more
What if you now do development work on a clone, but you to continue working on you own local clone while ‘disconnected’, such as when travelling? One simple option if the original database contains no private data, or the image has been masked, is to performance a normal backup and restore operations the clone, although you'll now be working with a normal, full-sized database. Read more
For teams who use a shared development database out of necessity rather than choice, SQL Clone might make the dedicated model viable for the first time. Read more
For most development teams, the database provisioning process involves some element of compromise. Either the process is slow, but the database is realistic or the process is fast but the database unrealistic. Chris Hurley explains why SQL Clone can allow the team to develop and test with a real database, without the compromises. Read more
Steve Jones proves that SQL Clone can create a clone from a TDE-protected SQL Server database backup. Read more
Steve Jones proves that SQL Clone can create a clone from a SQL Server database that is protected by Transparent Data Encryption (TDE). Read more
It has always been a difficult task to provision development and test environments so that they reflect as closely as possible what’s present in production. With the rise of containerization and Infrastructure as Code (IaC) technologies, some parts of this are becoming much easier. We can automate the process of spinning up and configuring new virtual Read more