Disaster Planning Includes You
Today we have a guest editorial from Andy Warren. Andy discusses the need to consider personnel when you are planning for things to go wrong.
2010-11-23
155 reads
Today we have a guest editorial from Andy Warren. Andy discusses the need to consider personnel when you are planning for things to go wrong.
2010-11-23
155 reads
Database refactoring is a difficult proposition at the best of times, but is rendered more or less impossible if the database is close-coupled to the application's other components. In a guest editorial, Mladen Prajdic stresses the importance of a native SQL Server abstraction layer.
2010-11-22
2,782 reads
Today we have an editorial reprint from Aug 23, 2005 as Steve is on vacation. Does security through obscurity work? Steve Jones thinks it can help in a limited sense, providing another layer of protection.
2010-11-22
122 reads
This Friday Steve Jones asks if you think that your job could be done with smaller devices. Is there a chance that a mobile phone, a tablet or something else could help you be more productive?
2010-11-19
157 reads
It seems that there is a disconnect between how technical people view security and how business people see it. Steve Jones talks about the problems that we have in trying to secure the systems we manage.
2010-11-18
174 reads
Are you truly an expert in SQL Server? Would you claim to be a 10 on a scale of 1 to 10? Steve Jones notes that the product is so wide and deep that it's unlikely any of us will be an expert in most of SQL Server, and that's OK.
2010-11-17
310 reads
Not many of us work at Google scale, where every little thing you do can matter. However Steve Jones thinks that the little things still matter when you are building software.
2010-11-16
231 reads
This past week saw the next version of SQL Server, code named Denali, released as a public CTP. Steve Jones comments on the new version.
2010-11-15
326 reads
We have to provide security for our data, and to some extent that means verifying who has access. SQL Server has limited means for doing this other than relying on the OS, but Steve Jones has some ideas on how to make this more secure.
2010-11-15
137 reads
This Friday Steve Jones talks about database design and specifically asks how you prefer to design triggers.
2010-11-12
887 reads
By Vinay Thakur
Continuing from Day 3 where we covered LLM models open/closed and their parameters, Today...
By Steve Jones
One of the nice things about Flyway Desktop is that it helps you manage...
By HeyMo0sh
Microsoft Fabric (not to be confused with the more general term “fabric” in DevOps)...
I'm fairly certain I know the answer to this from digging into it yesterday,...
Hi Team, I am trying to refresh the Azure Synapse Dedicated pool from production...
hi everyone I am not sure how to write the query that will produce...
I have some data in a table:
CREATE TABLE #test_data
(
id INT PRIMARY KEY,
name VARCHAR(100),
birth_date DATE
);
-- Step 2: Insert rows
INSERT INTO #test_data
VALUES
(1, 'Olivia', '2025-01-05'),
(2, 'Emma', '2025-03-02'),
(3, 'Liam', '2025-11-15'),
(4, 'Noah', '2025-12-22');
If I run this query, how many rows are returned?
SELECT *
FROM OPENJSON(
(
SELECT t.* FROM #test_data AS t FOR JSON PATH
)
) t; See possible answers