Analyze entity data flow in Power BI Desktop using Sankey charts
Siddharth Mehta looks at how and why to use Sankey charts and how this can be done in Power BI Desktop.
2018-04-05
3,082 reads
Siddharth Mehta looks at how and why to use Sankey charts and how this can be done in Power BI Desktop.
2018-04-05
3,082 reads
Azure Cosmos DB offers features that facilitate data availability and resiliency. However, there is also a different, very important aspect of facilitating access to distributed data sources in the most optimal manner, which focuses on access control mechanisms. Read on to learn the specifics of this aspect, as it applies to Azure Cosmos DB.
2018-04-04
2,223 reads
T-SQL does not have an easy way to transpose a row and a column. Of course, there is the PIVOT statement, but it doesn’t quite accomplish the task. In this article, Darko Martinovic shares another method using a SQLCLR stored prodedure.
2018-04-03
5,350 reads
When you’re planning for disaster recovery, offsite backups in the cloud are an attractive option. SQL Server Management Studio makes it easy to back up to the cloud inside the GUI, and you can learn how in just 90 seconds.
2018-04-02
3,400 reads
Tara Kizer explains that many of you are troubleshooting Parameter Sniffing issues the wrong way in production. In this three-part series, she will show you how to troubleshoot it the right way.
2018-03-30
3,974 reads
SQL Server 2017 now includes a new feature to represent complex relationships in data called Graph Databases. Robert Sheldon introduces Graph Databases in the first article of this new series.
2018-03-29
4,343 reads
With GDPR on the imminent horizon, there are many things that Data Platform engineers need to consider with regards to the rights of data subjects. Primary among these is understanding the impact of requests to be forgotten and updates to a person's data when it comes to restoring databases. If you have data that is within the scope of the GDPR then here are some thoughts on extra processes for your DR planning.
2018-03-28
3,302 reads
Once you enable your database to be encrypted with Transparent Data Encryption (TDE), the physical database files, and the database backups are encrypted. If your database and database backup are encrypted, then how can you send the encrypted backup to a person outside your organization?
2018-03-27
2,947 reads
Developer shops may decide to use Read Committed Snapshot Isolation (RCSI) to reduce contention, and possibly improve performance, but it is not without its own pitfalls. In this article, Uwe Ricken describes a situation where long running transactions caused a severe performance degradation when RCSI was in use.
2018-03-26
3,103 reads
Stored procedures, for example, are very easy to document. The comment block at the beginning stays with the code and a CREATE or ALTER script contains everything to reproduce the proc. SQL Server tables, however, are more difficult to document. You can use Extended Properties to document columns and constraints, but working with Extended Properties is difficult at best. Phil Factor demonstrates ways to easily add Extended Properties to your build scripts.
2018-03-23
3,324 reads
By Ed Elliott
Running tSQLt unit tests is great from Visual Studio but my development workflow...
By James Serra
I remember a meeting where a client’s CEO leaned in and asked me, “So,...
By Brian Kelley
If you want to learn better, pause more in your learning to intentionally review.
Comments posted to this topic are about the item The Long Name
Comments posted to this topic are about the item Eight Minutes
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
I run this code to create a table:
When I check the length, I get these results:
A table name is limited to 128 characters. How does this work?