Technical Article

Encryption Example

Here in this T-sql tip I'am trying to compare the word "Hijacker" with two cases(line 3 and 4). Now they are in same when you compare the case (letter to letter), now you change the case of word "Hijacker" in either of the lines and run this SQL statements it will return different results. This […]

You rated this post out of 5. Change rating

2002-01-05

665 reads

Technical Article

Granting Access Permissions...

Usually when we recreate or rename a table we need to give the appropriate access permissions to the SQL users...this is very common in database under development environment where frequently table structure changes and we have to recreate it....we can accomplish this with Enterprise Manager but what will you do if Enterprise Manager fails to […]

You rated this post out of 5. Change rating

2001-12-18

823 reads

Blogs

Introduction to SQL Server Query Store

By

Introduced with SQL 2016, Query Store was, probably without doubt, the most anticipated and...

Flyway with Multiple Folders

By

A customer asked about how they could organize their migration scripts in different ways...

Migrating from EverNote to Joplin

By

Recently I got a message that my Evernote subscription was going up. It’s been...

Read the latest Blogs

Forums

Database copy issue through - COPY DB WIZARD

By Kaushik Parui

I have a production server with SQL server 2016 version (13.0.5026.0) and a database...

Help with a SQL Unpivot

By rogue1009

I am trying to use unpivot to extract some data, however, the results are...

how to de escalte a isolation level, and are there any implications.

By rajemessage 14195

hi, I have one nested transaction and want to deescalate to outer  transaction's isolation/...

Visit the forum

Ask SSC Logo Ask SSC

SQL Server Q&A from the SQLServerCentral community

Get answers