Comparing Different Data Types
Comparing columns of different data types can be a drain on resources, as well as our sanity. This is a look into a few strategies for dealing with implicit conversions.
2014-05-19
10,226 reads
Comparing columns of different data types can be a drain on resources, as well as our sanity. This is a look into a few strategies for dealing with implicit conversions.
2014-05-19
10,226 reads
In data mining and machine learning circles, the neural network is one of the most difficult algorithms to explain. Fortunately, SQL Server Analysis Services allows for a simple implementation of the algorithm for data analytics. Dallas Snider explains
2014-05-19
3,590 reads
This article attempts to explain RAID's impact on SQL performance.
2014-05-16 (first published: 2012-05-01)
37,969 reads
Having a well thought-out plan for diagnostic data is important for on-premises applications, but it is arguably more important for distributed, highly scalable cloud applications. Michael Collier has provided a clear introduction to Microsoft Azure Diagnostics, including the Diagnostics Agent and how to extract the data.
2014-05-16
2,747 reads
A new plug in for Management Studio from Red Gate is free. It will give you access to all the scripts at SQLServerCentral, including your own briefcase.
2014-05-15
3,857 reads
This article details encrypted backups and how they are implemented in SQL Server 2014.
2014-05-15
5,103 reads
We recently faced an issue where an internal data provider began providing an incomplete or inaccurate files because it lacked the proper length (or didn't exceed a certain size). In our case, we implemented a check on the file before importing using PowerShell, here's what we did.
2014-05-15
2,501 reads
Dwain Camps shows that, depending on the size and characteristics of some hierarchical data, six different methods of traversal can each be the fastest at some point. He illustrates the danger in generalizing from just one set of test data, and that it's foolish to assume that just because SQL code looks neat, it will perform well.
2014-05-14
2,625 reads
This article demonstrates how to create a CLR assembly that can encrypt or decrypt a file with AES-256 cryptography, how to reference the CLR assembly from an SSIS script task, and how to generate an MD5 checksum file so that its recipient can confirm the integrity of the encrypted file.
2014-05-13
6,456 reads
This is an extract from the book Tribal SQL. In this article, Kevin Feasel explains SQL injection attacks, how to defend against them, and how to keep your Chief Information Security Officer from appearing on the nightly news.
2014-05-13
6,136 reads
2025 exposed a growing gap between AI ambition and operational reality. As budgets tightened...
By John
When organizations migrate workloads to Azure, the focus is usually on architecture, performance, and...
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
Comments posted to this topic are about the item The Max PK Length
Comments posted to this topic are about the item My experience using the GitHub...
Comments posted to this topic are about the item The Microsoft SQL Year in...
If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?
See possible answers