24 (Hours of SQL Training Delivered to Your Computer)
The Spring 24Hours of PASS: Celebrating Women in Technology will be broadcast live on the intertubez on March 15 and 16...
The Spring 24Hours of PASS: Celebrating Women in Technology will be broadcast live on the intertubez on March 15 and 16...
Arshad Ali demonstrates how to verify the SQL Server Service Broker (SSBS) configuration when both the Initiator and Target are in different SQL Server instances, how to communicate between them and how to monitor the conversation.
Now that the Denali CTP has been out for several months, Brad asks how you're planning on getting up to speed on the latest version of SQL Server
The purpose of this challenge is to test your query writing skills with a limited set of TSQL keywords.
Today we have an editorial reprinted from Jan 3, 2006 as Steve is on vacation. What's the quality of your code? Do you measure it? And does it matter?
To easily manage the permissions in SQL Server databases, Microsoft has provided several roles in SQL Server which are security principals that group other principals.
Often someone will try to perform a delete on a large number of records and run into a number of problems. Slow performance, log growth, and more. Lynn Pettis shows us how to better handle this situation in SQL Server 2000 and SQL Server 2005
Beginning with SQL Server 2005, column-level encryption and decryption capabilities were made available within the database, providing a solution for situations where one-off types of data need to be secured beyond your existing authorization, authentication or firewall settings. This article provides an overview and example of securing a column using native SQL Server cryptography functions.
One of the things I enjoy about work is seeing the various cultures that evolve. Some companies are rigid, some...
Thank you to everyone who participated in T-SQL Tuesday #198! When I wrote the...
Efficient query performance in Amazon Redshift often comes down to how well you manage...
By gbargsley
Welcome back to PowerShell Strikes Back. We’re three weeks in, and the training is...
Comments posted to this topic are about the item Stairway to Reliable Database Deployment...
Comments posted to this topic are about the item QUOTENAME Quote Parameters
Comments posted to this topic are about the item Limit the Blast Radius
When I use QUOTENAME(), I can optionally provide the character used to surround the string in the result. Can I use any character?
See possible answers