Encryption Example

Here in this T-sql tip I'am trying to compare the word "Hijacker" with two cases(line 3 and 4). Now they are in same when you compare the case (letter to letter), now you change the case of word "Hijacker" in either of the lines and run this SQL statements it will return different results. This […]

2002-01-05

652 reads

Granting Access Permissions...

Usually when we recreate or rename a table we need to give the appropriate access permissions to the SQL users...this is very common in database under development environment where frequently table structure changes and we have to recreate it....we can accomplish this with Enterprise Manager but what will you do if Enterprise Manager fails to […]

2001-12-18

801 reads

Blogs

The Data platform has evolved – so too must the DBA.

By

This blog post is around the changing landscape of both SQL Server and the...

What does the Machine Learning process look like?

By

This is the second article in the Machine Learning area. I have explained a...

Azure Cosmos DB: real-time data movement using Change Feed and Azure Functions

By

In this article, we will focus on creating a data pipeline to ETL (Extract,...

Read the latest Blogs

Forums

Container Ports

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Container Ports

Receiving timeout errors on SQL2014

By Dhruva_51

Similar to the one mentioned in the below article. We are sql server build...

Continue SQL Server transactional replication with AWS DMS

By tttcoding

Hello, I have a task for which I wasn't able to find much information...

Visit the forum

Ask SSC

SQL Server Q&A from the SQLServerCentral community

Get answers