Azure Stretch Database, Part I: Getting Going
With most innovative new technologies, Azure Stretch Database demos make it look completely easy. Here is a step by step to get going, with examples. Part One of a Two-Part series.
2019-08-26
4,961 reads
With most innovative new technologies, Azure Stretch Database demos make it look completely easy. Here is a step by step to get going, with examples. Part One of a Two-Part series.
2019-08-26
4,961 reads
SQL Server Auditing is a powerful out-of-the box toolset that captures auditing information and writes to a file or the Event Log. This article examines the little things that might snag you up.
2019-08-05 (first published: 2017-10-05)
11,221 reads
See how the ITIL Framework's Asset Management standards make the DBA's job easier. Use the CMDB and DML to keep your data assets under tight control.
2019-05-17 (first published: 2017-11-21)
3,621 reads
With exciting products like SQL Clone making their debut, the DBA will need to think through the approach to implementing such powerful tools. Done properly, these tools will provide a massive benefit to both the DBA and developer.
2019-05-10 (first published: 2017-11-28)
4,401 reads
We've gone through the basics of Peer-to-Peer Transactional Replication (PPTR). Now, we will blow it up! We will then fix it and show you how you how to triage and repair PPTR. When you remain calm and take some easy steps, you can stabilize PPTR with ease.
2019-01-04 (first published: 2016-01-07)
2,990 reads
As the Peer-to-Peer series continues, we set up an example topology in Peer-to-Peer Transactional replication and test it.
2018-12-28 (first published: 2015-11-05)
4,132 reads
There are times when you need to share tables between servers, where the table may be updated in both places. Peer-to-Peer Transactional Replication gives you the ability to create a solution. I explain the benefits and the downfalls.
2018-12-21 (first published: 2014-01-13)
6,263 reads
In a previous article, we discussed how to liberate the DBA from SQL Logins with AD Groups. A good point was raised: How can the DBA know who has what access? Here is a solution.
2018-08-03 (first published: 2016-02-18)
12,334 reads
The business decides on a packaged application and buys it. After installation, you look at the schema and realize that is is a nightmare. How do you manage this nightmare?
2018-05-02 (first published: 2015-12-22)
5,449 reads
With HIPAA and GDPR requiring your careful scrubbing of data for lower environments, random word generation promises to be a huge helper. Read here how to do it.
2018-05-01
5,891 reads
By Steve Jones
We had an interesting discussion about deployments in databases and how you go forward...
By ChrisJenkins
You could be tolerating limited reporting because there isn’t an off the shelf solution...
A while back I wrote a quick post on setting up key mappings in...
Comments posted to this topic are about the item Remotely Engineer Fabric Lakehouse objects:...
Comments posted to this topic are about the item Creating JSON III
Comments posted to this topic are about the item Testing is Becoming More Important
In a SQL Server 2025 table, called Beer, I have this data:
BeerIDBeerName 1Becks 2Fat Tire 3Mac n Jacks 4Alaskan Amber 8KirinI run this code:
SELECT JSON_OBJECTAGG(
BeerID: BeerName )
FROM beer;
What are the results? See possible answers