Encryption Example

Here in this T-sql tip I'am trying to compare the word "Hijacker" with two cases(line 3 and 4). Now they are in same when you compare the case (letter to letter), now you change the case of word "Hijacker" in either of the lines and run this SQL statements it will return different results. This […]

2002-01-05

653 reads

Granting Access Permissions...

Usually when we recreate or rename a table we need to give the appropriate access permissions to the SQL users...this is very common in database under development environment where frequently table structure changes and we have to recreate it....we can accomplish this with Enterprise Manager but what will you do if Enterprise Manager fails to […]

2001-12-18

801 reads

Blogs

When using Powershell to control Azure the Cloud Shell doesn’t require an additional login.

By

When studying Azure one of the things you’ll be asked to learn is the...

Running SQL Server containers as non-root

By

Recently I noticed that Microsoft uploaded a new dockerfile to the mssql-docker repository on...

Interview with Greg Low

By

This is the sixth interview we have done. This time our guest is Greg...

Read the latest Blogs

Forums

Is Data the Future of the Vibrant Web?

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Is Data the Future of...

Stairway to SQLCLR Level 2: Sample Stored Procedure and Function

By Solomon Rutzky

Comments posted to this topic are about the item Stairway to SQLCLR Level 2:...

Database in Recovery Pending state

By bobba

Good Morning, We had an issue yesterday where SQL Alerts were generated from one...

Visit the forum

Ask SSC

SQL Server Q&A from the SQLServerCentral community

Get answers