2015-06-10
567 reads
2015-06-10
567 reads
Alex Kuznetsov, in an article taken from his book 'Defensive Database Programming with SQL Server', shows how DRY principles can be put in practice with constraints, stored procedures, triggers, UDFs and indexes.
2015-06-10
6,344 reads
Aaron Bertrand has some advice on how to protect yourself from SQL Injection, looking at some specific common scenarios.
2015-06-09
4,756 reads
This metric shows Writelog wait time in ms, per elapsed second. Writelog wait types occur when the log cache is being flushed to disk. If this happens all the time, it may suggest disk bottlenecks where the transaction log is stored.
2015-06-09
2,958 reads
One of the times that you need things to go right is when you are doing analysis and reporting. This is generally based on time and date. A sure-fire way of getting managers upset is to get the figures horribly wrong by messing up the way that you handle datetime values in SQL Server. In the interests of peace, harmony and a long career in BI, Robert Sheldon outlines some of the worst mistakes you can make when using SQL Server dates.
2015-06-08
7,158 reads
Chuck Hoffman exposes the mysteries of getting CASE statements to work in dynamic ORDER BY statements.
2015-06-05 (first published: 2012-04-26)
26,680 reads
Microsoft released the preview version of Azure SQL Database V12 in December of 2014. As a database administrator, you might wonder about the schema and security of these new data marts. Microsoft has supplied system stored procedures for the database developer to query the Linked Servers for this type of meta data, as John Miner explains.
2015-06-05
2,288 reads
In this article, James Munro demonstrates an example of a simple query without an index and then that same query again with the index. A simple introduction to database indexing.
2015-06-04
7,210 reads
In this tip Koen Verbeeck discusses query folding, how you can take advantage from it and how to make sure query folding takes place.
2015-06-03
3,661 reads
Criminal activity is a growing menace on the internet: This inevitably means more diligence is required by legitimate users in the face of an increasingly sophisticated criminal threat. Robert Sheldon describes some of the emerging threats and risks.
2015-06-02
4,544 reads
By Steve Jones
Redgate is a for-profit company. We look to make money by building and selling...
I’ve uploaded the slides for my Techorama session Microsoft Fabric for Dummies and my...
If you've ever loaded a 2 GB CSV into pandas just to run a...
Comments posted to this topic are about the item Even When You Know What...
Comments posted to this topic are about the item The New Software Team
Comments posted to this topic are about the item Database Mail in SQL Server...
We create the following table and then insert some records in it:
create table t1 ( id int primary key, category char(1) not null, product varchar(50) ); insert into t1 values (1, 'A', 'Product 1'), (2, 'A', 'Product 2'), (3, 'A', 'Product 3'), (4, 'B', 'Product 4'), (5, 'B', 'Product 5');What happens if we execute the following query in both Sql Server and PostgreSQL?
select id,
category,
string_agg(product, ';')
over (partition by category order by id
rows between unbounded preceding and unbounded following) as stragg
from t1; See possible answers