A first look at Visual Studio 2008 Database Edition
Learn about Microsoft Visual Studio Team System 2008 for database professionals, a useful tool for database development with Microsoft SQL Server.
Learn about Microsoft Visual Studio Team System 2008 for database professionals, a useful tool for database development with Microsoft SQL Server.
Every application uses data, and Android applications are no exception. Android uses the open-source, stand-alone SQL database, SQLite. Learn how to create and manipulate a SQLite database for your Android app.
How do I ... Determine Database Growth If I Am Not Tracking It? If your database has grown considerably and you're not sure when or why it happened, you'll be hard pressed to figure out the answer unless you're tracking changes in database size.
This SQL School video introduces us to the data mining queries that you can run from BIDS in an Analysis Services project.
In this month's energy update Steve Jones takes a look at more efficient building practices to increase energy efficiency.
I want to move my database on my SQL Server 2005 system to a new drive, but I have database options, like cross-database ownership chaining, that I don't want to lose or have to remember to re-apply. How can I do this?
This article provides an overview and presents an example illustrating the role of transactions in processing Service Broker dialogs usage.
After some recent talks with security folks and auditors, one of the things I have had a hard time getting across is that you must trust those folks responsible for account and server management when it comes to securing your data. Yes, you can put in...
Should IT charge other departments for the use of its resources? Is that good for the business? Steve Jones comments on what this could mean for SQL Server DBAs.
MVP Jacob Sebastian has written a great series on working with XML in SQL Server and we have the latest installment today. This time he presents a library of functions that can produce an RSS ATOM compliant feed of data.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Prompt Requests
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers