Creating Striped Backups - SQL School Video
This SQL School video shows how you can speed up your backup process by striping the backup across multiple disks. MVP Andy Warren narrates.
This SQL School video shows how you can speed up your backup process by striping the backup across multiple disks. MVP Andy Warren narrates.
An article sponsored by SQL Sentry that compares how the Data Collector in SQL Server 2008 and SQL Sentry's Performance Advisor can be used with your SQL Server. Written by MVP Aaron Bertrand.
Sometimes cursors are necessary when executing queries in SQL Server, but most of the time they can be avoided entirely. This article shows where cursors can traditionally be used, and how you can use features packaged in SQL Server 2005 to avoid them.
This Friday's poll looks at your productivity. Is there some technology that has really helped you do your job better?
While SQL Server 2008 offers several new benefits for organizations, the trick is figuring out if those performance and availability advantages are truly worth the upgrade.
One of the common questions often asked online is how to respond to a full transaction log. New author Krishna Potlakayala brings us a few techniques for dealing with this.
It is ingrained in many developers and DBAs to keep transactions in SQL Server "as short as possible". Why does this mindset exist? Does it imply a deep-seated lack of confidence in the scalability of SQL Server's locking and concurrency models?
Phil shows how 'CROSS APPLY' can be useful for writing thank-you letters or thinking of excuses as to why your project has failed....
A column alias seems like a great tool for referencing complex expressions, but SQL Server doesn't work that way. Learn a simple workaround.
The previous installment of the 'SQL Server 2005 Express Edition' series discussed using transactions to protect the integrity and consistency of Service Broker-based communication. Depending on the type of issue encountered by our code, the outcome might be different from expected. This article demonstrates a more robust approach to error handling and applies it to our target.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers