Up Your Value
With the economy in a recession, how should you be managing your career? Steve Jones talks a little about building your brand and showing value to your employer.
With the economy in a recession, how should you be managing your career? Steve Jones talks a little about building your brand and showing value to your employer.
With the economy in a recession, how should you be managing your career? Steve Jones talks a little about building your brand and showing value to your employer.
Learn how to use the SSMS GUI to modify tables in this SQL School video.
With all the bailouts being requested in the US, where is the money for DBAs who need it?
Are lots of people adopting SQL Server 2008? Should you be looking at it? Steve Jones has a few comments on what the new lifecycle of SQL Server might mean for DBAs and developers.
Are lots of people adopting SQL Server 2008? Should you be looking at it? Steve Jones has a few comments on what the new lifecycle of SQL Server might mean for DBAs and developers.
Are lots of people adopting SQL Server 2008? Should you be looking at it? Steve Jones has a few comments on what the new lifecycle of SQL Server might mean for DBAs and developers.
A question on the forum asked how to find all the database mappings for a particular login. If you're on SQL Server 2000 or below, the tables you want to use are syslogins in the master database and sysusers in each database.
The company I work for has decided to use the encryption technology available in SQL Server 2005. We have almost everything ironed out except for which keys to use in the development, testing, and production environments. Should we use one key for all three environments or different keys for each?
Deleting all the data in a SQL Server database doesn't have to involve complex code. The undocumented stored procedure sp_MSForEachTable safely bypasses built-in limitations to accomplish this common task.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Dancing Robot Goes Rogue
Hi , i installed winscp on my pc, added it to GAC thru vs...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers