Stupid Interviewer Tricks
Today's editorial was originally published on Feb 7, 2008. It is being re-published as Steve is on vacation.
What do you do when the interviewer is obviously wrong? Steve Jones offers a perspective.
Today's editorial was originally published on Feb 7, 2008. It is being re-published as Steve is on vacation.
What do you do when the interviewer is obviously wrong? Steve Jones offers a perspective.
One of the most obvious bottlenecks in the performance of tempdb is caused by PAGELATCH, in-memory latch contention on the allocation bitmap of each data file used. We can use one of the rules-of-thumb to choose what should be roughly the best number of files, but how then do you check to see whether you've got it right for your data and workload?
Today we have a guest editorial from Hakim Ali. Today Akim talks about why holding back out of politeness in code reviews may be a self-defeating practice.
Managing log files in a large enterprise environment can be an overwhelming task. In this article I will show you how to automate some of the work using SQL Alerts and Powershell 2.0
ReFS, the new file system with Windows Server 2012, should be good news, but its apparent lack of support for SQL Server is a serious concerned for Phil Factor.
I've been charged with coming up with a quick solution to audit login changes on my SQL Servers. However, there's no budget so I'm going to have to come up with basic scripts and the like to do the work. Is this tip we cover a solution for you to audit login changes.
This article identifies which indexes are used when T-SQL code runs, and proposes ways of improving these targeted indexes, leading to better performing code.
Use the power of regular expressions to cleanse your data right there inside the Data Flow. This transformation includes a full user interface for simple configuration, as well as advanced features such as error output configuration. Two regular expressions are used, a match expression and a replace expression. The transformation is designed around the named capture groups or match groups, and even supports multiple expressions.
There are some very interesting projects being performed with cloud services. Steve Jones talks about a few and the new computing without limits claim from Google.
Recently I was supporting a third party application. It queries to determine what tables it has permissions to before it proceeds with the rest of its functionality. We had implemented permissions based on the best practice of creating roles, assigning the permissions to the roles, and then making the users members of the roles. The application was querying INFORMATION_SCHEMA.TABLE_PRIVILEGES and of course didn't find any permissions directly against the user in question. We ended up granting explicit permissions to the user so the application would work, but I'm more interested in the general case. How can I determine permissions for an individual user?
It's time for T-SQL Tuesday #198! This month's topic is change detection. The post T-SQL...
By James Serra
Model Context Protocol, or MCP, is one of those technical ideas that sounds more...
When starting with AWS RDS Aurora for managing relational databases in the cloud, many...
By CHERRYWIFARM- The Best CBD flowers Europe - Wholesale Hemp Flowers Europe
Whatsapp:083135765355 Jl. Kawi No.36, Gading Kasri, Kec. Klojen, Kota Malang, Jawa Timur 65116
By CHERRYWIFARM- The Best CBD flowers Europe - Wholesale Hemp Flowers Europe
Whatsapp:083135765355 Jl. S. Supriadi No.65, Sukun, Kec. Sukun, Kota Malang, Jawa Timur 65117
In honor of May the fourth and Star Wars (may the force be with you), finish this quote:
"Do, or do not. ..."See possible answers