Terraform Commands
I realized I never created a post to show how to deploy Terraform from VS Code. I haven’t done that in a while because I don’t do it at...
2025-08-13
54 reads
I realized I never created a post to show how to deploy Terraform from VS Code. I haven’t done that in a while because I don’t do it at...
2025-08-13
54 reads
This month’s TSQL Tuesday invite is from my good friend, long standing MVP and community volunteer Taiob Ali – Taiob’s call is to blog on how AI, (the biggest...
2025-08-13
11 reads
I’m late to the party this month. Taiob Ali has a great invite for a topic that is likely on most people’s minds: AI and your career. I constantly...
2025-08-13
53 reads
Imagine this situation, someone edits a stored procedure on a production server to “fix” something. However, they broke the procedure and you find out the next day. How do...
2025-08-13
127 reads
When deploying SQL Server in enterprise environments, choosing the right service account model is critical for security, manageability, and scalability. Traditionally, DBAs have relied on standard domain accounts with static passwords,...
2025-08-12
38 reads
There are always bad actors who will seek to get access to and, likely, exfiltrate (exfil) the data. But they don't want to get caught; they don't want to...
2025-08-11
22 reads
In today’s hybrid and multi-cloud world, managing SQL Server instances across diverse environments can be a daunting task. Enter Azure Arc—Microsoft’s game-changing solution that brings the power of Azure to...
2025-08-07
22 reads
The textile world is undergoing a transformation, one where creativity meets computation, and tradition dances with technology. Artificial intelligence is not just automating processes; it is unlocking new dimensions...
2025-08-07
24 reads
On August 6, 2025, Microsoft announced a vulnerability with hybrid deployments because of a shared service principal between the Exchange on-premises deployment and Exchange Online. The vulnerability is found...
2025-08-07
41 reads
Back in June I blogged about pig butchering and the amount of reported losses we're seeing here in the United States of America. This type of cyber scam is...
2025-08-06
22 reads
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Prompt Requests
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers