Workspace Identity Authentication for your Power BI Semantic Models in Microsoft Fabric
This article shows how you can easily create connections in your Power BI workspace that use Identity Authentication to connect to your data.
This article shows how you can easily create connections in your Power BI workspace that use Identity Authentication to connect to your data.
The advantage of using triggers is that the same processing can occur regardless of where or how the data has been inserted, updated or deleted. In this article, we look at several examples of where and why triggers could be useful along with an example use case.
Many of the GenAI services are using the free model of the past, where they use your data in ways you might not expect. Now, a court is ensuring OpenAI keeps your chat data around.
In Level 1 of the Stairway to Azure SQL Hyperscale, we learn about the architecture and create a hyperscale instance.
In this article, we’ll revisit the dimension models we created. We wrote the entire SQL statement for the dimension by hand, and the dimensions themselves were very rudimentary; they lacked a surrogate key and there were no audit columns (such as insert date and update date). We’ll show you how we can expand the dimensions using Jinja, but also how we can minimize development effort by baking reusable patterns into the Jinja code.
Page splits are an often-overlooked performance killer in SQL Server. In this article, we take a forensic look at how serial inserts differ from mid-table inserts, revealing why inserting rows out of order causes hidden page splits, increased IO, and fragmentation. Using a wide-column table, we demonstrate both scenarios and decode their impact with page-level analysis.
TEXT, NTEXT, and IMAGE columns have been deprecated for nearly two decades, yet they still silently haunt many SQL Server environments. This article explains their hidden limitations with practical demos and shows why migrating to VARCHAR(MAX), NVARCHAR(MAX), and VARBINARY(MAX) is critical for modern performance, maintainability, and future upgrades.
When you run a CI/CD pipeline, you often need confidential values like passwords, authentication tokens, service principal secrets etc. when you want to deploy a certain artefact. You don’t want to store those secrets directly in your pipelines as this might pose a considerable security leak. Instead, you either store them as secret variables, or […]
Introduction ChatGPT includes custom GPTs. You can create your own custom GPT. In this article, we will demonstrate how to create a custom GPT expert in SQL Server. Requirements To create your own GPT, you need to use the paid version of ChatGPT. First, go to ChatGPT. Secondly, if you don’t have the paid version, […]
By Brian Kelley
If you're looking for particular "Black Friday" deals, here is what I've seen advertised...
By SQLPals
Dry-run xp_delete_file Before Actually Deleting Files? xp_delete_file doesn’t really have a...
By Brian Kelley
In the United States, today is Thanksgiving. The intent behind the holiday is to...
Comments posted to this topic are about the item Don't Let Corner Cases Drive...
Comments posted to this topic are about the item A New Operator
Comments posted to this topic are about the item Troubleshooting Common SQL Server Errors:...
In SQL Server 2025, what does this code return?
SELECT '1' || '0'See possible answers