Guidelines and Requirements
We have some requirements that we meet a particular setting or value, but often we have guidelines and recommendations. Do you know the difference?
We have some requirements that we meet a particular setting or value, but often we have guidelines and recommendations. Do you know the difference?
This article shows how you can easily create connections in your Power BI workspace that use Identity Authentication to connect to your data.
The advantage of using triggers is that the same processing can occur regardless of where or how the data has been inserted, updated or deleted. In this article, we look at several examples of where and why triggers could be useful along with an example use case.
Many of the GenAI services are using the free model of the past, where they use your data in ways you might not expect. Now, a court is ensuring OpenAI keeps your chat data around.
In Level 1 of the Stairway to Azure SQL Hyperscale, we learn about the architecture and create a hyperscale instance.
In this article, we’ll revisit the dimension models we created. We wrote the entire SQL statement for the dimension by hand, and the dimensions themselves were very rudimentary; they lacked a surrogate key and there were no audit columns (such as insert date and update date). We’ll show you how we can expand the dimensions using Jinja, but also how we can minimize development effort by baking reusable patterns into the Jinja code.
Page splits are an often-overlooked performance killer in SQL Server. In this article, we take a forensic look at how serial inserts differ from mid-table inserts, revealing why inserting rows out of order causes hidden page splits, increased IO, and fragmentation. Using a wide-column table, we demonstrate both scenarios and decode their impact with page-level analysis.
TEXT, NTEXT, and IMAGE columns have been deprecated for nearly two decades, yet they still silently haunt many SQL Server environments. This article explains their hidden limitations with practical demos and shows why migrating to VARCHAR(MAX), NVARCHAR(MAX), and VARBINARY(MAX) is critical for modern performance, maintainability, and future upgrades.
When you run a CI/CD pipeline, you often need confidential values like passwords, authentication tokens, service principal secrets etc. when you want to deploy a certain artefact. You don’t want to store those secrets directly in your pipelines as this might pose a considerable security leak. Instead, you either store them as secret variables, or […]
By Brian Kelley
I thought it would be good to put my thoughts down on how to...
You want the short answer? Well, the only antidote to knowledge stagnation is probably...
By Chris Yates
It always starts the same way. You open your laptop on a Monday morning,...
Comments posted to this topic are about the item Guidelines and Requirements
Comments posted to this topic are about the item Copying Production Schema
Comments posted to this topic are about the item Workspace Identity Authentication for your...
If I use DBCC CLONEDATABASE, can I remove some of the information from the copy?
See possible answers