2025-04-07
1,682 reads
2025-04-07
1,682 reads
2022-05-25
487 reads
2017-05-01 (first published: 2017-04-19)
1,177 reads
In this article, Thomas Knight analyzes and critiques the design of, and experience with, the "dual-level" user security in SQL Server. He then demonstrates a better theoretical alternative.
2014-02-04
4,362 reads
This script will either reoprt or 'fix' lost or orphaned users after restore for all versions of SQL.
2010-02-24 (first published: 2010-02-04)
2,247 reads
This script basically retreives all database users thier database roles for a database.
2010-02-10 (first published: 2010-01-20)
3,484 reads
By Steve Jones
AI is a big deal in 2026, and at Redgate, we’re experimenting with how...
By Steve Jones
Another of our values: The facing page has this quote: “We admire people who...
By Ed Elliott
Running tSQLt unit tests is great from Visual Studio but my development workflow...
Hi, We have low latency high volume system. I have a table having 3...
Comments posted to this topic are about the item The Long Name
Comments posted to this topic are about the item Eight Minutes
I run this code to create a table:
When I check the length, I get these results:
A table name is limited to 128 characters. How does this work?