2004-02-11
1,943 reads
2004-02-11
1,943 reads
2004-02-10
1,869 reads
2004-02-06
2,047 reads
2004-02-04
1,746 reads
2004-02-02
1,505 reads
2004-01-30
1,617 reads
In part one Chris Kempster covered a variety of security recommendations primarily for production systems. In Part two of this series he continues to explore security at a variety of levels where you may not realize you are vulnerable.
2019-10-04 (first published: 2004-01-30)
35,422 reads
2004-01-27
1,811 reads
Andy continues writing about replication, this week discussing the many options available when creating a snapshot publication. As we noted on his last article, this one may take longer than usual to load due the large number of images but we think the readability of having it all one page is worth while.
2004-01-27
12,807 reads
2004-01-22
1,863 reads
By Steve Jones
I’m not sure I knew identity column values could not be updated. I ran...
By Steve Jones
We had an interesting discussion about deployments in databases and how you go forward...
By ChrisJenkins
You could be tolerating limited reporting because there isn’t an off the shelf solution...
I have mentioned this several times over several years. Can someone please help me...
SELECT COUNT(DISTINCT Component) AS Found FROM tblComponents WHERE(Component NOT LIKE '%[a-z]%') AND(LTRIM(RTRIM(Component)) = 'GM13622')...
Comments posted to this topic are about the item Remotely Engineer Fabric Lakehouse objects:...
In a SQL Server 2025 table, called Beer, I have this data:
BeerIDBeerName 1Becks 2Fat Tire 3Mac n Jacks 4Alaskan Amber 8KirinI run this code:
SELECT JSON_OBJECTAGG(
BeerID: BeerName )
FROM beer;
What are the results? See possible answers