Product Review: SQL Refactor
Danny Lesandrini reviews SQL Refactor, a SQL Server Add-In that works with the new SQL Server Management Studio.
2007-02-01
2,964 reads
Danny Lesandrini reviews SQL Refactor, a SQL Server Add-In that works with the new SQL Server Management Studio.
2007-02-01
2,964 reads
We continue with our look at the people behind SQL Server with a very interesting interview from one of the senior support
engineers, Bob Dorr.
2007-01-31
4,793 reads
This series will illustrate the various ways of using the SQL Server 2005 command line utility “SQLCMD”.
2007-01-31
2,990 reads
Tim Chapman discusses the concept of message-based applications, and the new foundation for building these applications included in SQL Server 2005.
2007-01-30
2,733 reads
I recently read a blog post on doing case-insensitive text searches on SQL Server 2005. The post said that an index on a computed column might be used even if the computed column itself wasn't used in the WHERE clause. I was curious to test that and see how far I might take it.
2007-01-29
3,398 reads
SQL Server 2005, the next evolution of SQL Server, should be growing the capacities as well as the capabilities of the product. With some research, Steve Jones brings you the best current information he could find about SQL Server 2005, comared with the SQL Server 7 and 2000 values.
2007-01-26 (first published: 2004-11-01)
41,914 reads
Damon Armstrong presents an extremely powerful and flexible token replacement mechanism for your ASP.NET applications. It is based on regular expressions so allows you to search for dynamic text, instead of just a static token, in a given string.
2007-01-26
2,182 reads
Service Broker is one of the more interesting and useful new enhancements in SQL Server 2005, however many DBAs are not familiar with this subsystem. New author Santhi Indukuri brings us a practical example of how you can build a distributed application using Service Broker.
2007-01-25
18,965 reads
This article deals specifically with insider threats to IT describing how IT professionals are implementing the necessary products, policies, and procedures to reduce insider threats and provide the necessary reporting for regulatory compliance.
2007-01-24
2,933 reads
This is the fourth part of an ongoing series. The series is titled The Data Stewardship Approach to Data Governance. For information regarding future chapters, please use my contact information below. Previous articles were titled The Data Won't Govern Itself, Data Governance Is NOT a Methodology and The Tools of Data Governance.
2007-01-23
1,705 reads
By alevyinroc
Ten years (and a couple jobs) ago, I wrote about naming default constraints to...
By Steve Jones
We have multiple teams (8) working on Redgate Monitor. Some work on the Standard...
By HeyMo0sh
Learning any kind of theory is easy, but adapting FinOps and watching it rescue...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item The Problem Isn't Always Your...
Comments posted to this topic are about the item Identity Defaults
What happens when I run this code?
CREATE TABLE dbo.IdentityTest
(
id int IDENTITY(10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
See possible answers