New Version of CPU-Z (1.57) has Been Released
On February 18, Franck Delattre released version 1.57 of the very useful CPU-Z Utility. Here is a list of the...
2011-02-23
2,996 reads
On February 18, Franck Delattre released version 1.57 of the very useful CPU-Z Utility. Here is a list of the...
2011-02-23
2,996 reads
We ran into a case recently where we had the logins and users scripted out on my SQL Server instances, but we didn't have the fixed database roles for a critical database. As a result, our recovery efforts were only partially successful. We ended up trying to figure out what the database role memberships were for that database we recovered but we'd like not to be in that situation again. Is there an easy way to do this?
2011-02-23
3,104 reads
We have recently found an elegant way to reduce the time, and disk space required for SharePoint administrators who need to perform granular recovery operations out of their SQL Server backup files. I used to get customer calls that would go something like this:
2011-02-23
2,185 reads
The Spring 24Hours of PASS: Celebrating Women in Technology will be broadcast live on the intertubez on March 15 and 16...
2011-02-22
1,575 reads
Arshad Ali demonstrates how to verify the SQL Server Service Broker (SSBS) configuration when both the Initiator and Target are in different SQL Server instances, how to communicate between them and how to monitor the conversation.
2011-02-22
2,249 reads
The purpose of this challenge is to test your query writing skills with a limited set of TSQL keywords.
2011-02-21
1,709 reads
To easily manage the permissions in SQL Server databases, Microsoft has provided several roles in SQL Server which are security principals that group other principals.
2011-02-21
3,665 reads
Often someone will try to perform a delete on a large number of records and run into a number of problems. Slow performance, log growth, and more. Lynn Pettis shows us how to better handle this situation in SQL Server 2000 and SQL Server 2005
2011-02-18 (first published: 2009-09-15)
54,549 reads
Beginning with SQL Server 2005, column-level encryption and decryption capabilities were made available within the database, providing a solution for situations where one-off types of data need to be secured beyond your existing authorization, authentication or firewall settings. This article provides an overview and example of securing a column using native SQL Server cryptography functions.
2011-02-18
4,894 reads
One of the things I enjoy about work is seeing the various cultures that evolve. Some companies are rigid, some...
2011-02-18
1,369 reads
It's time for T-SQL Tuesday #198! This month's topic is change detection. The post T-SQL...
By James Serra
Model Context Protocol, or MCP, is one of those technical ideas that sounds more...
When starting with AWS RDS Aurora for managing relational databases in the cloud, many...
Hi to all We have situation at a client where someone is illegally changing...
Hi to all We have situation at a client where someone is illegally changing...
Ruko Soho Emas, Jl. Klampis Jaya No.39, Klampis Ngasem, Sukolilo, Surabaya, Jawa Timur 60117
I have this data in a table called dbo.NFLTeams
TeamID TeamName City YearEstablished ------ -------- ---- --------------- 1 Cowboys Dallas 1960 2 Eagles Philadelphia 1933 3 Packers Green Bay 1919 4 Chiefs Kansas City 1960 5 49ers San Francisco 1946 6 Broncos Denver 1960 7 Seahawks Seattle 1976 8 Patriots New England 1960If I run this code, how many rows are returned?
SELECT TOP 2
json_objectagg('Team' : TeamName)
FROM dbo.NFLTeams;
See possible answers