Technical Article

Encryption Example

Here in this T-sql tip I'am trying to compare the word "Hijacker" with two cases(line 3 and 4). Now they are in same when you compare the case (letter to letter), now you change the case of word "Hijacker" in either of the lines and run this SQL statements it will return different results. This […]

2002-01-05

663 reads

Technical Article

Granting Access Permissions...

Usually when we recreate or rename a table we need to give the appropriate access permissions to the SQL users...this is very common in database under development environment where frequently table structure changes and we have to recreate it....we can accomplish this with Enterprise Manager but what will you do if Enterprise Manager fails to […]

2001-12-18

818 reads

Blogs

Function Vs. Performance

By

Recently I was looking through DBA.StackExchange when I saw a pretty simple question that...

Daily Coping 3 Oct 2022

By

Today’s coping tip is to write down three things you appreciate about yourself. I...

Scary Scalar Functions - Part Four: Your Environment

By

Scary Scalar Functions series overview Part One: Parallelism Part Two: Performance Part Three: The Cure Part Four: Your...

Read the latest Blogs

Forums

Version Controlling Lambdas

By barakgodi

I know there are lambda versions. But I want to know if this can...

subscriber part of ALWAYSON

By SQL Galaxy

Hi. Publisher stop sending transaction to AOAG primary replica whenever AG failover.  It seems...

SQL Server Licensing Question

By atangvels

I'm in the process of replacing a sql server 2012 with 2019. How do...

Visit the forum

Ask SSC Logo Ask SSC

SQL Server Q&A from the SQLServerCentral community

Get answers