Post-migration Validation and Optimization Guide
SQL Server post migration step is very crucial for reconciling any data accuracy and completeness, as well as uncover performance issues with the workload.
SQL Server post migration step is very crucial for reconciling any data accuracy and completeness, as well as uncover performance issues with the workload.
In this article, we are going to learn the basics of SQL unit testing and how to write a SQL unit test through the tSQLt framework.
In this article, learn how to control access levels to various data and parts of Power BI reports using row-level security as well as column and object-level security.
Some advice from Steve and Sam Altman, whether you work in business or want to build one.
This article shows how to use Python to access data in SQL Server and produce a K-Means analysis with a chart.
Imagine this: you have several directories full of SQL script files, and you need to know where a certain table is used. You’d rather like the context too, so you can check the whole SQL Expression and work out why it is running so slowly.
Generative AI is everywhere, but especially in software development. Is it helping us? Steve has a few thoughts.
Introduction This article celebrates a classic algorithm [1] of Dijkstra (1930 – 2002) which finds a path of minimal cost between any pair of nodes in an undirected graph. His procedure is widely recognized as a fundamental tool for examining communication and transportation networks (eg. Google Maps) and is surprisingly simple. By his own admission, […]
A good way to showcase your skills is by working through and documenting a project and solution. Steve notes today that this is important in today's hiring market and asks for sample projects you might suggest for others.
Lemme start this off by saying this is probably irrelevant to you. (It’s irrelevant to me, too.)
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Dancing Robot Goes Rogue
Hi , i installed winscp on my pc, added it to GAC thru vs...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers