TSQL Challenge 50 - Extracting a specifical range from random data wit
The purpose of this challenge is to test your query writing skills with a limited set of TSQL keywords.
The purpose of this challenge is to test your query writing skills with a limited set of TSQL keywords.
Today we have an editorial reprinted from Jan 3, 2006 as Steve is on vacation. What's the quality of your code? Do you measure it? And does it matter?
To easily manage the permissions in SQL Server databases, Microsoft has provided several roles in SQL Server which are security principals that group other principals.
Often someone will try to perform a delete on a large number of records and run into a number of problems. Slow performance, log growth, and more. Lynn Pettis shows us how to better handle this situation in SQL Server 2000 and SQL Server 2005
Beginning with SQL Server 2005, column-level encryption and decryption capabilities were made available within the database, providing a solution for situations where one-off types of data need to be secured beyond your existing authorization, authentication or firewall settings. This article provides an overview and example of securing a column using native SQL Server cryptography functions.
One of the things I enjoy about work is seeing the various cultures that evolve. Some companies are rigid, some...
SQLServerCentral launches a new series of content today, aimed at helping you bootstrap your knowledge in specific areas of SQL Server.
Today we launch a new series of content aimed at providing basic knowledge to people new to a section of SQL Server. Steve Jones comments on the way this series came about.
Last night’s Oregon SQL user
group meeting was very enlightening. Mark Simms form the SQLCAT team came
down from Redmond to talk...
By Brian Kelley
If you want to learn better, pause more in your learning to intentionally review.
By John
If you’ve used Azure SQL Managed Instance General Purpose, you know the drill: to...
By DataOnWheels
Ramblings of a retired data architect Let me start by saying that I have...
Not sure if this is really a relational theory question but it seems about...
Hi everyone, Below is a consolidated summary of what we validated Architecture & data...
Hi all, I recently moved to a new employer who have their HA setup...
I have this data in a SQL Server 2025 table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers