The Wild Developers of SQL Server like Wildcards
Phil Factor explains the enduring attachment of database developers to wildcards, despite their current deficiencies.
2025-03-17 (first published: 2018-12-17)
470 reads
Phil Factor explains the enduring attachment of database developers to wildcards, despite their current deficiencies.
2025-03-17 (first published: 2018-12-17)
470 reads
Phil Factor's offers tips for longevity in the world of IT consultancy: listen well, humiliate no-one and convince others that it was their expertise that solved the problem.
2024-12-27 (first published: 2020-01-18)
421 reads
Idempotence is the property of certain operations in mathematics and computer science, that can be applied multiple times without changing the result beyond the first time they are run. When you are making changes to a database to deploy a new version, you need to be sure that certain changes aren’t made twice, or in the wrong order.
2023-10-04 (first published: 2016-12-21)
19,567 reads
Phil Factor looks at some technologists more famous for thwarting progress than for their own creations.
2022-09-02 (first published: 2017-07-17)
307 reads
One of the problems to which I keep returning is finding the best way to read and apply documentation for databases. As part of a series of articles I'm doing for Redgate's Product Learning, I've been demonstrating how to maintain a single source of database documentation, in JSON, and then add and update the object […]
2021-06-28 (first published: 2021-05-28)
3,587 reads
Git has proved to be a better fit to the needs and workflow of a database development team than anything that came before. Git is valuable because it encourages branching and merging, giving more choice in the way that your team can work. Due to the ease with which you can adapt Git, there is […]
2021-04-03
152 reads
Now that we've explored, in preceding levels, some of the information that is available about indexes, triggers, keys and distribution statistics, we can concentrate on the tables themselves and their columns.
2021-01-13 (first published: 2016-12-07)
6,248 reads
Learn how to generate some convincing data for your development databases.
2021-01-05
2,893 reads
2020-12-12
314 reads
If you're faced by an investigation team, after a data breach, it is no use putting on your 'Mr. Sincerity' face and making vague statements. They want documented facts.
2020-11-14
157 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
Hi, our peer who owns a remote mysql server from which we extract warehouse...
What is returned as a result set when I run this command without a new seed value?
See possible answers