Using Notebooks in Azure Data Studio
Learn how to use the notebook feature of Azure Data Studio to keep a set of queries together with some documentation.
Learn how to use the notebook feature of Azure Data Studio to keep a set of queries together with some documentation.
In the past, Steve hasn't often felt management considered databases to be important, but that is changing.
Learn the basics of how Dynamic Data Masking can be used to obfuscate data in SQL Server 2016+.
New solution allows developers and teams to “buy the base and rent the peak” when provisioning for variable workloads without wastage or performance tradeoffs
Or perhaps another way to phrase that is, Microsoft is up to something with parallelism. I don’t know how long it’s been this way – could even be since the launch of Azure SQL DB Serverless – but I just now noticed it while helping a client with a slow query.
When we need to be heroes in IT on a regular basis, that's a problem for Steve.
This article will show the basic outline for how Python scripts can access and work with data in SQL Server.
I’ve quietly resolved performance issues by re-writing slow queries to avoid DISTINCT. Often, the DISTINCT is there only to serve as a “join-fixer,” and I can explain what that means using an example.
Speed of delivery and protecting data can often feel incompatible, but there are industry-proven database DevOps practices that bring them together in harmony.
Across each of these five key practices, there’s a theme of removing barriers and cognitive load for teams; but crucially, they are also putting safeguards in place to reduce the risks to production environments.
William Shakespeare once wrote in the play Romeo and Juliet: “What's in a name? That which we call a rose, by any other word would smell as sweet.” It is a beautiful sentiment in that context, and even still you might say that there is some truth to this saying in a lot of ways. […]
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers