2015-06-10
563 reads
2015-06-10
563 reads
Alex Kuznetsov, in an article taken from his book 'Defensive Database Programming with SQL Server', shows how DRY principles can be put in practice with constraints, stored procedures, triggers, UDFs and indexes.
2015-06-10
6,344 reads
Aaron Bertrand has some advice on how to protect yourself from SQL Injection, looking at some specific common scenarios.
2015-06-09
4,756 reads
This metric shows Writelog wait time in ms, per elapsed second. Writelog wait types occur when the log cache is being flushed to disk. If this happens all the time, it may suggest disk bottlenecks where the transaction log is stored.
2015-06-09
2,958 reads
One of the times that you need things to go right is when you are doing analysis and reporting. This is generally based on time and date. A sure-fire way of getting managers upset is to get the figures horribly wrong by messing up the way that you handle datetime values in SQL Server. In the interests of peace, harmony and a long career in BI, Robert Sheldon outlines some of the worst mistakes you can make when using SQL Server dates.
2015-06-08
7,158 reads
Chuck Hoffman exposes the mysteries of getting CASE statements to work in dynamic ORDER BY statements.
2015-06-05 (first published: 2012-04-26)
26,655 reads
Microsoft released the preview version of Azure SQL Database V12 in December of 2014. As a database administrator, you might wonder about the schema and security of these new data marts. Microsoft has supplied system stored procedures for the database developer to query the Linked Servers for this type of meta data, as John Miner explains.
2015-06-05
2,288 reads
In this article, James Munro demonstrates an example of a simple query without an index and then that same query again with the index. A simple introduction to database indexing.
2015-06-04
7,210 reads
In this tip Koen Verbeeck discusses query folding, how you can take advantage from it and how to make sure query folding takes place.
2015-06-03
3,661 reads
Criminal activity is a growing menace on the internet: This inevitably means more diligence is required by legitimate users in the face of an increasingly sophisticated criminal threat. Robert Sheldon describes some of the emerging threats and risks.
2015-06-02
4,544 reads
By Steve Jones
the kinder surprise – . the point in your early adolescence when you realize...
By Tim Radney
Over the past few weeks, I’ve been contacted by multiple customers experiencing the same...
By Vinay Thakur
These days everything is changing to AI World, IT roles are getting changed and...
Jl. Metro Pondok Indah No.10 Lt 2, RT.3/RW.17, Pd. Pinang, Kec. Kebayoran Lama, Kota...
Tlpn/wa0853.7373-7551 Gedung WTC Jl. Mangga Dua Raya. 8 Lantai 6, Blok CL 001, RT.CL,...
Comments posted to this topic are about the item There's Too Much to Learn
On which Linux versions is SQL Server 2025 on Linux supported?
See possible answers