Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
Log in  ::  Register  ::  Not logged in

Latest Blog Posts

Running Parameterized Queries against SQL Server using PowerShell

For many years I didn’t really think about the implications of how I was retrieving data from my SQL Servers in PowerShell. I was just happy that I was able to retrieve the data! As I learned more about SQL Server I started to think of things like SQL injection…

Read more

0 comments, 26 reads

Posted in on 13 October 2015

Putting Corrections in Perspective using Power BI

My enthusiasm for analyzing stock market data using Power BI – even after publishing two posts recently (this and this) – is at all-time high, unlike the stock market itself. In today’s edition let’s try to put corrections in perspective.

September tensions

In the first report shown below,… Read more

0 comments, 32 reads

Posted in Sam Vanga on 13 October 2015

Keep an eye on those Audit files!

This month’s T-SQL Tuesday (#71) is hosted by Sebastian Meine (b/t). He has picked an interesting security subject. SQL Server Audits. Fortunately this is one I have a bit of experience with. It’s one of my favorite new features if only because it’s so simple to… Read more

0 comments, 21 reads

Posted in SQLStudies on 13 October 2015

SQL server Encryption – Transparent Data Encryption

In the previous blogs we saw the use of certificates to encapsulate symmetric keys. How it benefits the user by maintaining the password rather than user having to mention it every time a key is opened for use.
In all the above methods we are protecting data at a granular…

Read more

0 comments, 37 reads

Posted in Kruti's SQL Blog on 13 October 2015

A tSQLt Mistake – Debugging a Test

While I was working on a test the other day, it kept failing. Not a big surprise, but I couldn’t figure out why. When I looked at tsqlt.testresults, I saw extra rows. Double rows in fact, and that threw me.

This was my Assemble code.

-- Assemble

Read more

1 comments, 113 reads

Posted in The Voice of the DBA on 12 October 2015

Attending PASS Summit? Take a great Tuesday precon!

We’re just two weeks away from the PASS Summit in Seattle,  and there is most definitely still time to get into our Tuesday pre-conference session, “The Enterprise Scripting Workshop“. That’s a full day of training with 100 of your closest friends* for just $495. SESSION DETAILS Abstract: The database administrator…

Read more

0 comments, 77 reads

Posted in SQL Awesomesauce on 12 October 2015

Argenis Without Borders: Fun For a Good Cause

This is the second year of Argenis Without Borders and the second year that I’m taking part. Last year we hit the fund-raising goal and I wore the rainbow fuzzy leggings at the PASS Summit. This year, it feels like we’re a little behind the goal. We need you to… Read more

2 comments, 51 reads

Posted in The Scary DBA on 12 October 2015

Thank You for Attending my #SQLSatOrlando Session! Slides, Resources, Recording

SQL Saturday #442 in Orlando, FL has come and gone but what a turn out! The event was excellent, we had a great turnout for our session and had a blast! And as a bonus, the BBQ lunch, baked beans, coleslaw, mac n cheese and dessert were amazing. Seriously one… Read more

0 comments, 56 reads

Posted in SQL with Dustin Ryan on 12 October 2015

Simplified Session Backups

PowerShell exposes scads of information and provides the professional with a formidable tool for the tool-belt. Over the past several articles, I have demonstrated how this tool can be used to uncover useful information and metadata.

The groundwork has been laid to be able to mine information about each of… Read more

0 comments, 55 reads

Posted in SQL RNNR on 12 October 2015

How to create a database on a network share

If for any reason you need to place the database on a network share and by default this option is off you can follow the way described below: A database on a network share is created by running T-sql script, graphic mode will not work in this case. So, first… Read more

0 comments, 51 reads

Posted in Forrards Group Database Blog on 12 October 2015

Columnstore Indexes – part 68 (“Data Loading, Delta-Stores & Vertipaq Compression Optimisation”)

Continuation from the previous 67 parts, the whole series can be found at This blog post is focusing on some of the important details of loading data into Columnstore Indexes and the things that have changed in SQL Server…

Read more

0 comments, 99 reads

Posted in Niko's blog on 11 October 2015

Hekaton Part 8 - Hash Collisions - Hash_Index_Stats DMV

Continuing from previous post , this post will discuss a few scenarios on hash collisions.
The following "in memory" table with a hash index is created. Please note that the hash bucket count has been set to 1024. Hash bucket count 1024 implies that hash collisions are certain after row…

Read more

0 comments, 56 reads

Posted in SQL and SQL Only on 11 October 2015

SQL Saturday #453–Minnesota 2015 Session Recap–A Window into Your Data

Thanks for attending my session on T-SQL Window Functions. I hope you learned something you can take back and use in your projects or at your work. You will find an link to the session and code I used below. If you have any questions about the session post them… Read more

0 comments, 70 reads

Posted in DataOnWheels on 10 October 2015

Indexed views on any core SQL server edition–The video

A few months back I created a blog post showing that you can indeed create and use indexed views on any core SQL server edition. It has proved to be one of my most read blog posts. Since then Webucator, provider of SQL Server training, got in contact… Read more

0 comments, 93 reads

Posted in SQL Server Rocks! on 10 October 2015

SQL server encryption – Certificates

In the previous blogs we saw how to encrypt data using symmetric and asymmetric keys.

Its important to note that while using these functions we need to ensure the password is included correctly.…

Read more

0 comments, 53 reads

Posted in Kruti's SQL Blog on 10 October 2015

SQL server encryption – Asymmetric Keys

In the previous blog we learnt about symmetric key encryption. We also learnt through an example how data is stored in varbinary form after encryption and how the original text can be retrieve using the corresponding decrypt function.

In this blog we will see something similar with the same…

Read more

0 comments, 51 reads

Posted in Kruti's SQL Blog on 10 October 2015

SQL server encryption – Symmetric Keys

In the previous blog we learnt about encryption and a brief about the SQL server option provided for data protection through encryption. 

In this blog we will learn with a demo how to use the first option Symmetric Keys for encryption.As stated earlier symmetric keys use the same…

Read more

0 comments, 46 reads

Posted in Kruti's SQL Blog on 10 October 2015

SQL Server Encryption

Encryption is a methodology used to hide confidential information from any illegitimate user is such a way that they do not see the actual contents of the information. Rather they get access to some cipher text. This text can be decrypted to its original form by legitimate users by the…

Read more

0 comments, 54 reads

Posted in Kruti's SQL Blog on 10 October 2015

Video of #sqlrelay talk - build a ci pipeline in 55 minutes

My session yesterday was recorded, apart from the fact that me and mark were having a chat for about 25 minutes before it kicked off it seemed to work quite well:

Skip forward to 24:32 to get to the actual content.

Read more

0 comments, 123 reads

Posted in Ed Elliott's Sql Developer Blog on 9 October 2015

How do you choose a source control system for your SQL Server database

If you already have a source code repository for your app code or other databases or you have another team that uses source control then just use theirs.

If you don't then use whatever the members of your team have used most, they all basically do the same thing and…

Read more

0 comments, 124 reads

Posted in Ed Elliott's Sql Developer Blog on 9 October 2015

Older posts