The Burden of Proof - MP3
Steve Jones asks about the disclosure of source code in legal proceedings.
2008-02-07
51 reads
Steve Jones asks about the disclosure of source code in legal proceedings.
2008-02-07
51 reads
Steve Jones asks about the disclosure of source code in legal proceedings.
2008-02-07
41 reads
If you have considered deploying a Data Governance program at your organization, the chances are that you have asked the following question: "Where does Data Governance fit into the Organization?"
2008-02-07
1,127 reads
Finding missing data in a sequence of numbers or dates is a common request of DBAs. Regular author Jacob Sebastian brings us a new article that shows just how you can do this.
2008-02-06
8,732 reads
The regular expression transformation exposes the power of regular expression matching within the pipeline. One or more columns can be selected, and for each column an individual expression can be applied. If all columns selected pass their tests then rows are passed down the successful match output. Rows that fail to pass all tests are directed down the alternate output.
2008-02-06
2,578 reads
Explore how the rich reporting functionality in Crystal Reports XI and SQL Server Reporting Services 2005 works with common reporting requirements.
2008-02-06
4,376 reads
Have you ever wanted to read your transaction log? Wonder what information is inside there? New author S. Srivathsani takes a look at one of the log tools out on the market, Lumigent's Log Explorer.
2008-02-05 (first published: 2007-03-06)
6,233 reads
Corporate management often asks for feedback and buy-in with their ideas and programs. Why don't they get it?
2008-02-05
44 reads
Corporate management often asks for feedback and buy-in with their ideas and programs. Why don't they get it?
2008-02-05
48 reads
Corporate management often asks for feedback and buy-in with their ideas and programs. Why don't they get it?
2008-02-05
52 reads
By Steve Jones
Fear is fueled by a lack of imagination. The antidote to fear is not...
The slidedeck and the SQL scripts for the session Indexing for Dummies can be...
By Chris Yates
Change is not a disruption in technology; it is the rhythm. New frameworks appear,...
We have a report that has multiple tables that list the top 15 performers...
We have a tool called DB Moto that reads journals (like t-logs) and replicates...
Comments posted to this topic are about the item Don't Forget About Financial Skills
The DBCC CHECKIDENT command is used when working with identity values. I have a table with 10 rows in it that looks like this:
TravelLogID CityID StartDate EndDate 1 1 2025-01-11 2025-01-16 2 2 2025-01-11 2025-01-16 3 3 2025-01-11 2025-01-16 4 4 2025-01-11 2025-01-16 5 5 2025-01-11 2025-01-16 6 6 2025-01-11 2025-01-16 7 7 2025-01-11 2025-01-16 8 8 2025-01-11 2025-01-16 9 9 2025-01-11 2025-01-16 10 10 2025-01-11 2025-01-16The docs for DBCC CHECKIDENT say this if I run with only the table parameter: "If the current identity value for a table is less than the maximum identity value stored in the identity column, it is reset using the maximum value in the identity column. " I run this code:
DELETE dbo.TravelLog WHERE TravelLogID >= 9 GO DBCC CHECKIDENT(TravelLog, RESEED) GO INSERT dbo.TravelLog ( CityID, StartDate, EndDate ) VALUES (4, '2025-09-14', '2025-09-17') GOWhat is the identity value for the new row inserted by the insert statement above? See possible answers