Do we do enough?
Do we, event organizers, tool vendors, concerned SQL citizens, as a community, do enough to reach people who don't know about the training available to them?
Do we, event organizers, tool vendors, concerned SQL citizens, as a community, do enough to reach people who don't know about the training available to them?
Your job is to write a query that identifies the longest matching country/area code from each phone number based on the information stored in an area-code reference table.
Whenever rows or columns are deleted from a table, SQL Server reuses space to accommodate new data. However, this is not the case when a variable length column is deleted. The space used by this type of column is not reclaimed automatically. Variable length columns can be of data types varchar, nvarchar, varchar(max), nvarchar(max), varbinary, varbinary(max), text, ntext, image, sql_variant, and xml. In this tip, I have tried to put forth a solution to reclaim this space and this should work for SQL 2005 and later versions.
The SQL-92 standard introduced the LEFT Outer Join operation which offers a powerful alternative to standard relational processing to perform full hierarchical processing naturally and inherently. This enables SQL to transparently integrate relational data with XML, IMS and other forms of legacy hierarchical data. This can also allow the so far overlooked integration of IMS and legacy data with the Internet and XML, and visa versa.
Today we have a guest editorial from Andy Warren that talks about what DBAs might need to know in the future.
You are a database developer looking for a common approach for handling read and write access to binary files. You may be a DBA wanting to read various information from binary files and collect it into tables. The code sample presented in this tip will get you started with binary file content handling in SQL Server.
Platform as a service, a new way of looking at applications. It's analogous to SAAS and IAAS, which can improve the efficiency of the software purchase or the hardware acquisition process. Steve Jones notes that this is something he'd like to see for database platforms.
In part 2 of our best practices clinic, Brad McGehee looks at a couple of the items that were misconfigured on the SQLServerCentral database instances.
This article demonstrates how to prevent primary key violation issues in transactional replication.
By Steve Jones
Recently I ran across some code that used a lot of QUOTENAME() calls. A...
By ChrisJenkins
There are some telltale signs that your growing business has outgrown Excel for your...
Thank you to everyone who participated in T-SQL Tuesday #198! When I wrote the...
Comments posted to this topic are about the item Stairway to Reliable Database Deployment...
Comments posted to this topic are about the item QUOTENAME Quote Parameters
Comments posted to this topic are about the item Limit the Blast Radius
When I use QUOTENAME(), I can optionally provide the character used to surround the string in the result. Can I use any character?
See possible answers