Please, Sir, I want some more… orphaned database users.
Permissions on our development servers are considerably less stringent than elsewhere with developers afforded the freedom to restore backup’s ad-hoc....
Permissions on our development servers are considerably less stringent than elsewhere with developers afforded the freedom to restore backup’s ad-hoc....
I know there are fixed server roles that come with SQL Server. How do I best use them within my installations? What should I watch out for?
Step by step to create a Decision Tree and how to understand the results showed by Analysis Services
This articles explores how you can work with filtered models, a powerful new feature introduced in SQL Server 2008 that allows you build models on slices of a mining structure.
On the Friday at the end of the Summit we had a 4 hour Board meeting, welcoming new board members...
The inclusion of the CLR in SQL Server has been controversial, but some people have come up with great ways to take advantage of this feature. New author Anders Pedersen brings us a technique to export data from SQL Server into Excel using the CLR.
We all want the best. Whether it's a new stereo or a high availability solution for your database server. Steve Jones talks about the need for us to learn more in order to make the best decision for ourselves.
SQL Server Reporting Services 2008 introduced several new features. One key feature was the inclusion of the Gauge Controls. I...
I need to encrypt my data within SQL Server and I plan on using the built-in encryption functionality in SQL Server 2005 and 2008. However, I'm looking at symmetric and asymmetric key algorithms and while I see information saying to use symmetric keys, I don't understand why. What's the difference between the two and why is a symmetric key algorithm preferred over the asymmetric key ones?
This article describes a method of gathering and analyzing performance data using SQL Trace.
If you've ever loaded a 2 GB CSV into pandas just to run a...
By James Serra
What problem is Fabric Ontology trying to solve? For years, most data conversations have...
By Steve Jones
Recently I ran across some code that used a lot of QUOTENAME() calls. A...
Comments posted to this topic are about the item Stairway to Reliable Database Deployment...
Comments posted to this topic are about the item QUOTENAME Quote Parameters
Comments posted to this topic are about the item Limit the Blast Radius
When I use QUOTENAME(), I can optionally provide the character used to surround the string in the result. Can I use any character?
See possible answers