Technical Article

Encryption Example

Here in this T-sql tip I'am trying to compare the word "Hijacker" with two cases(line 3 and 4). Now they are in same when you compare the case (letter to letter), now you change the case of word "Hijacker" in either of the lines and run this SQL statements it will return different results. This […]

You rated this post out of 5. Change rating

2002-01-05

667 reads

Technical Article

Granting Access Permissions...

Usually when we recreate or rename a table we need to give the appropriate access permissions to the SQL users...this is very common in database under development environment where frequently table structure changes and we have to recreate it....we can accomplish this with Enterprise Manager but what will you do if Enterprise Manager fails to […]

You rated this post out of 5. Change rating

2001-12-18

827 reads

Blogs

Check your regions people

By

Today I was having a nice discussion with some colleagues about Fabric and pricing/licensing...

Using Git Prune–#SQLNewBlogger

By

As I’ve been working with SQL Saturday and managing changes to events, I’ve accumulated...

Microsoft Purview new data governance features

By

Starting last week is a rollout of the public preview of a new and...

Read the latest Blogs

Forums

Read Only Replica in SQL Server Standard

By Stewart "Arturius" Campbell

Comments posted to this topic are about the item Read Only Replica in SQL...

Identifying Customer Buying Pattern in Power BI - Part 1

By Farooq Aziz

Comments posted to this topic are about the item Identifying Customer Buying Pattern in...

Backup of encrypted databases failing

By Leo.Miller

I've had some backups of my encrypted databases failing with the error "BACKUP 'DBName'...

Visit the forum

Question of the Day

Read Only Replica in SQL Server Standard

Our environment runs using SQL Server Standard. We are implementing Availability groups. Our database has been experiencing high read volumes, so I want to let the application read the Synchronized Secondary replica, as I read that HADR does this. Can we implement this?

See possible answers