Viewing 15 posts - 661 through 675 (of 6,022 total)
One thing that most all data breaches have in common is that it involves data access patterns that are not typical. The hacker must poke around, exploring for vulnerabilities, and...
December 20, 2018 at 8:58 am
RegEx is useful, particularly for ETL, but from the perspective an application, having the data in a normalized and index-able format is more useful. A discussion came up a few...
December 19, 2018 at 11:46 am
December 19, 2018 at 11:28 am
Jeff Moden - Tuesday, December 18, 2018 7:17 PMWhat does the warning triangle have to say?
It's warning about cardinality...
December 19, 2018 at 6:26 am
Otoh, why are you specifying a...
December 18, 2018 at 3:54 pm
Here is a portion of the execution plan:
December 18, 2018 at 3:42 pm
After examining Query Store, I have determined the following update statement is the source for the sample error above. It's performing an UPDATE/JOIN between a staging table and the production...
December 18, 2018 at 3:37 pm
OK, here I will restate the problem, this time with less obfuscation, except for the actual data values involved.
Here is a sample error.
Cannot insert duplicate key...
December 18, 2018 at 3:32 pm
December 18, 2018 at 3:20 pm
December 18, 2018 at 12:13 pm
December 18, 2018 at 11:54 am
December 18, 2018 at 10:26 am
I don't think we should shape and force a RDMS like SQL Server to act something like a EAV or document database. We've got more data storage options inside SQL...
December 18, 2018 at 10:04 am
December 18, 2018 at 9:55 am
Entity-Attribute-Value tables are good for modeling operational configuration data; things like configuration strings, thresholds, and client implementation settings. The benefit is that it allows the application developers to easily create...
December 18, 2018 at 7:45 am
Viewing 15 posts - 661 through 675 (of 6,022 total)