Improving database development with SQL Source Control
A webinar sponsored by Red Gate Software showing you how easy it can be to source control your database code. Thursday, August 19, 2010 12:00 PM EDT
A webinar sponsored by Red Gate Software showing you how easy it can be to source control your database code. Thursday, August 19, 2010 12:00 PM EDT
How can you better keep employees engaged in your company? Keep them happy and hopefully retain them for a long time? Steve Jones has some comments today.
DDL triggers enable us to audit DDL changes but there are a few missing events, design decisions and installation complications.
Performing a LEFT OUTER JOIN in TSQL is easy. The same logic in StreamInsight requires a little more work. In this presentation I show exactly how you can perform a LEFT OUTER JOIN on your event streams. Your browser cannot play this video. Learn how to fix this.
With cloud computing use growing, and SQL Server Azure becoming more popular, Steve Jones wishes this would become a product that the rest of us could deploy.
Today we have a guest editorial from Tim Mitchell that tells you how to turn a bad job into something more.
You need to periodically ascertain if there are any databases in your production environment which are not in SQL Server 2008 Compatibility Level. In this tip we cover the step by step process for setting up a policy to identify databases that are not in SQL Server 2008 Compatibility Level.
Longtime DBA David Poole brings us an interesting situation in involving setting up a user to allow Excel to query data from SQL Server.
Today we have a guest editorial from Andy Warren that talks about the value of blogging.
This document provides you with information that will help you understand the concepts of identity in SharePoint 2010 products, how Kerberos authentication plays a critical role in authentication and delegation scenarios, and the situations where Kerberos authentication should be leveraged or may be required in solution designs. The document also shows you how to configure Kerberos authentication end-to-end within your environment, including scenarios which use various service applications in SharePoint Server. Additional tools and resources are described to help you test and validate Kerberos configuration. The "Step-by-Step Configuration" sections of this document cover several SharePoint Server 2010 scenarios.
By DataOnWheels
I have been active in the data community throughout my career. I have met...
By Vinay Thakur
Quick Summary for Microsoft SQL Server till 2025, I am fortunate to be part...
By James Serra
Why this comparison feels confusing If you’re a Power BI report author who’s just...
SQL Server is typically viewed as a transactional or analytical database engine. However, it...
Hello, Is there a way in Azure SQL Database to change the 'Blocking Process...
Comments posted to this topic are about the item Having a Little Fun at...
On SQL Server 2025, when I run this, what is returned?
SELECT EDIT_DISTANCE_SIMILARITY('SQL Server', 'MySQL') See possible answers