Technical Article

Encryption Example

Here in this T-sql tip I'am trying to compare the word "Hijacker" with two cases(line 3 and 4). Now they are in same when you compare the case (letter to letter), now you change the case of word "Hijacker" in either of the lines and run this SQL statements it will return different results. This […]

2002-01-05

665 reads

Technical Article

Granting Access Permissions...

Usually when we recreate or rename a table we need to give the appropriate access permissions to the SQL users...this is very common in database under development environment where frequently table structure changes and we have to recreate it....we can accomplish this with Enterprise Manager but what will you do if Enterprise Manager fails to […]

2001-12-18

823 reads

Blogs

Why i use a smaller docker image part I

By

What is Docker? Docker is a famous platform for building, shipping, and running container...

New Job -> Week 2 -> Creating a Checklist

By

This is part of a series of new job blog posts. You can find...

SQL Server 2022 Administration Inside Out

By

SQL Server 2022 Administration Inside Out is now available for pre-order from Microsoft Press. This...

Read the latest Blogs

Forums

SQL blocking caused by running ALTER VIEW script

By webrunner

Hello experts, One of our developers tried to alter a view and reported to...

script to find the frequent used login information in the sql

By pols

Hi, Kindly some one share the script or query to get the login information...

SQL Server Agent is not expanding and Jobs are not visible

By pols

Hi, We are not able to expand the SQL SERVER Agent. It is taking...

Visit the forum

Ask SSC Logo Ask SSC

SQL Server Q&A from the SQLServerCentral community

Get answers