How to create indexes on computed columns in SQL Server
There are certain requirements for creating indexes on computed columns and this tip shows you want needs to be done.
There are certain requirements for creating indexes on computed columns and this tip shows you want needs to be done.
Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.
Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.
Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.
This article from Zach Mattson shows how you can set up custom error handling in your SSIS packages. Learn how to direct those error rows to another component for separate processing.
This SQL School video will introduce you to the INTERSECT command in T-SQL. MVP Andy Warren explains how this command allows you to find matching rows in a join and a UNION.
In a recent blog post, SQL Server expert Denny Cherry discusses adding a user interface to his Standalone SQL Agent, a replacement for the SQL Server Agent service.
This article shows the steps to analyze SQL Server logins and permissions to ensure that there are no logins and users that exist who are have unnecessary access
I received a review copy of Murach's SQL Server 2008 For Developers a couple months back and just finished up looking through it. In general I've always liked the style of the Murach books; short lessons that flow about as logically as you can do it when it often seems like you need to know it all to get anything done!
This year, I was asked to participate on the PASS Program Committee Management team as the “Speaker Manager.” One of my tasks is to create a Speaker’s Resource page on the SQLPASS.org website to aid speakers who want to submit session abstracts for the 2009 PASS Summit, which will be held in Seattle, WA from November 3 — 6, 2009.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers