Placing a Value on Data
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
Is it better to build an API into your code and allow someone to "plug in" or provide them with source code? Steve Jones thinks the former is better and gives you a few reasons why.
This article is an attempt to explain the application of new XML support in SQL Server 2005 for efficient data storage and performance.
Did you know that SQL Server maintains a great set of text logs about events on the server? MVP Andy Warren shows you how to get information out of the error logs in this SQL School video.
I've started a blog to write down and track my personal goals:
The Goal Keeping DBA
Since Active August is part of reaching my goal...
Join BI Architect Bill Pearson as he leads hands-on practice with the “Clusters” discretization method in Analysis Services. In this article we continue to explore attribute discretization, as a part of an extended examination of the dimensional model lying at the heart of the integrated Microsoft Business Intelligence solution.
Is it better to build an API into your code and allow someone to "plug in" or provide them with source code? Steve Jones thinks the former is better and gives you a few reasons why.
Is it better to build an API into your code and allow someone to "plug in" or provide them with source code? Steve Jones thinks the former is better and gives you a few reasons why.
Is it better to build an API into your code and allow someone to "plug in" or provide them with source code? Steve Jones thinks the former is better and gives you a few reasons why.
I was asked to do an hour presentation during the 24 Hours of PASS, which takes place on Sept 2,...
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers