Stupid Interviewer Tricks
Today's editorial was originally published on Feb 7, 2008. It is being re-published as Steve is on vacation.
What do you do when the interviewer is obviously wrong? Steve Jones offers a perspective.
Today's editorial was originally published on Feb 7, 2008. It is being re-published as Steve is on vacation.
What do you do when the interviewer is obviously wrong? Steve Jones offers a perspective.
One of the most obvious bottlenecks in the performance of tempdb is caused by PAGELATCH, in-memory latch contention on the allocation bitmap of each data file used. We can use one of the rules-of-thumb to choose what should be roughly the best number of files, but how then do you check to see whether you've got it right for your data and workload?
Today we have a guest editorial from Hakim Ali. Today Akim talks about why holding back out of politeness in code reviews may be a self-defeating practice.
Managing log files in a large enterprise environment can be an overwhelming task. In this article I will show you how to automate some of the work using SQL Alerts and Powershell 2.0
ReFS, the new file system with Windows Server 2012, should be good news, but its apparent lack of support for SQL Server is a serious concerned for Phil Factor.
I've been charged with coming up with a quick solution to audit login changes on my SQL Servers. However, there's no budget so I'm going to have to come up with basic scripts and the like to do the work. Is this tip we cover a solution for you to audit login changes.
This article identifies which indexes are used when T-SQL code runs, and proposes ways of improving these targeted indexes, leading to better performing code.
Use the power of regular expressions to cleanse your data right there inside the Data Flow. This transformation includes a full user interface for simple configuration, as well as advanced features such as error output configuration. Two regular expressions are used, a match expression and a replace expression. The transformation is designed around the named capture groups or match groups, and even supports multiple expressions.
There are some very interesting projects being performed with cloud services. Steve Jones talks about a few and the new computing without limits claim from Google.
Recently I was supporting a third party application. It queries to determine what tables it has permissions to before it proceeds with the rest of its functionality. We had implemented permissions based on the best practice of creating roles, assigning the permissions to the roles, and then making the users members of the roles. The application was querying INFORMATION_SCHEMA.TABLE_PRIVILEGES and of course didn't find any permissions directly against the user in question. We ended up granting explicit permissions to the user so the application would work, but I'm more interested in the general case. How can I determine permissions for an individual user?
By Steve Jones
on tenderhooks – adj. feeling the primal satisfaction of being needed by someone, which...
By DataOnWheels
I have been active in the data community throughout my career. I have met...
By Vinay Thakur
Quick Summary for Microsoft SQL Server till 2025, I am fortunate to be part...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
hi, in an ssis for each loop over an object variable called MyListVariable, i...
SQL Server is typically viewed as a transactional or analytical database engine. However, it...
On SQL Server 2025, when I run this, what is returned?
SELECT EDIT_DISTANCE_SIMILARITY('SQL Server', 'MySQL') See possible answers