Agile on a Fixed Budget
Scott examines strategies for dealing with constraints that business stakeholders may put on software development teams.
2007-08-29
2,486 reads
Scott examines strategies for dealing with constraints that business stakeholders may put on software development teams.
2007-08-29
2,486 reads
Not every application needs a full-featured enterprise-scale database. In such cases, you can reduce costs and save resources by using a small-footprint database.
2007-08-29
3,786 reads
SQL Server MVP Simon Sabin brings us a very interesting article on a possibilltyfor using enumerated values instead of integer or other coded foreign keys. It is an interesting idea that could go a long way towards making code easier to read.
2007-08-28
13,017 reads
Part 7 of our "Developing a Complete SQL Server OLTP Database Project" discusses performance issues resulting from using EncryptByCert and DecryptByCert. Read the article and download the code to run the test yourself.
2007-08-28
1,980 reads
This article shows how to use DDL triggers to capture schema changes. This solutions works a little differently than most DDL triggers examples. This script captures the old object that was replaced.
2007-08-28
2,785 reads
If you're in the UK in October, you might want to sign up for the SQLBits Community day put on by MVP Simon Sabin.
2007-08-27
708 reads
Danny Gould has written a very interesting piece of software that gives you a view into the storage of your data inside SQL Server. And it's FREE!!! He brings us a description of this software in this short article.
2007-08-27
13,139 reads
This article shows how to use the SqlDataSource and AccessDataSource controls to query data from a relational database.
2007-08-27
3,636 reads
This article demonstrates how you can use Surface Area Configuration utility in order to modify some of the security-related settings that have been applied during installation of SQL Server 2005 Express Edition.
2007-08-27
1,878 reads
One of the more interesting new features with SQL Server 2005 is the native encryption built into the product. Expert SQL crpytographer, Michael Coles, brings us a look at the symmetric keys in SQL Server 2005 and how they can be used to encrypt data and be secured by a certificate.
2007-08-24 (first published: 2007-05-11)
54,564 reads
By Steve Jones
This was Redgate in 2010, spread across the globe. First the EU/US Here’s Asia...
By John
Today is Christmas and while I do not expect anybody to actual be reading...
By Bert Wagner
Until recently, my family's 90,000+ photos have been hidden away in the depths of...
Comments posted to this topic are about the item UNISTR Escape
Comments posted to this topic are about the item Celebrating Tomorrow
Comments posted to this topic are about the item SQL Art: I Made a...
In SQL Server 2025, I run this command:
SELECT UNISTR('*3041*308A*304C\3068 and good night', '*') as "A Classic";
What is returned? (assume the database has an appropriate collation)
A:
B:
C:
See possible answers