Working with Amazon Simple DB
This article explores the concepts and methods necessary to create, manipulate, and work with Amazon Simple DB.
This article explores the concepts and methods necessary to create, manipulate, and work with Amazon Simple DB.
As we build more sophisticated maintenance procedures, we increase the complexity of our systems. Is that a good thing? Steve Jones has a few comments on what this means for DBAs.
MVP Andy Warren continues his series of videos on auditing with a look at removing old data. In this video, learn how to develop an easy system to keep a rolling history, removing anything older than a set number of days.
In the third article in his series on styling reports, Aaron Akin takes a look at using templates to ease and speed development.
Question: Why is my mirror database in a restoring state? Hi, I am still working on DB mirroring with prinicpal and mirror. There will be no Witness. This is what I did and
This article is the first in a series of articles that will be covering all the Control Flow Tasks and Maintenance Plan Tasks in SQL Server 2008 Integration Services
A tip from MSSQLTips that shows a few ways for implementing paging on large tables.
The Northwind database has a place in our collective hearts, despite all efforts to displace it in favor of AdventureWorks. However, a lot has happened in the past twelve or so years, and Phil Factor wonders if we can't, as a community, do better.
There is a good chance that the process of purchasing software or hardware in your organization involves several people. DBAs will often initiate a request, but are not normally trained in the arts of influencing the management decision process to ensure that essentials get purchased. It is becoming essential to understand how to get Management support for software purchases. Dan offers nuggets of wisdom.
As we build more sophisticated maintenance procedures, we increase the complexity of our systems. Is that a good thing? Steve Jones has a few comments on what this means for DBAs.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Prompt Requests
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers