Migrations are Worth the Effort
Steve prefers database migrations as a way of making changes to a database, though he knows they are hard. He gives a few reasons to choose them.
Steve prefers database migrations as a way of making changes to a database, though he knows they are hard. He gives a few reasons to choose them.
Source control is fundamental when dealing with projects and sharing code between multiple developers. Power BI present some challenges related to source control. But it’s finally providing us with a solution to these challenges. Let’s analyse this piece-by-piece.
I'm writing this on the last day of PGConf.EU, sitting here in Prague. I'm looking forward to sitting in several more sessions today, as well as having a few more conversations with the people at the conference. It's been a great event and I'm so happy I've been able to take part. Following the PASS […]
This article examines the challenges with searches on encrypted data and presents a possible solution that you might use to speed up those queries.
A cloud migration for DoorDash interested Steve, primarily because it didn't work, but they were able to back out and try again.
Azure CosmosDB provides ODBC driver that enables you to query CosmosDB collections like classic databases. In this post you will see how to query CosmosDB collections from Sql Server using Transact-Sql.
Tell me if you’ve heard this one before: I changed data from my application, but when I checked the database, I couldn’t see the change! I’ve seen this. Loads. It can be quite perplexing for folks because they expect to see an error message if the insert, update, or delete failed.
Learn about using an alias in the GROUP BY clause for complex SQL Server code instead of having to rewrite the code in the GROUP BY.
Fingerprint readers on laptops are shown not to be as secure as they could be, and primarily because the manufacturers haven't done a good job implementing the secure protocols.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Prompt Requests
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers