SQL String User Function Workbench: part 1
Robyn and Phil go back to basics and hammer out some basic String-handling User Functions in TSQL, based on Python examples. Plenty of sample code, and TSQL programming tricks.
Robyn and Phil go back to basics and hammer out some basic String-handling User Functions in TSQL, based on Python examples. Plenty of sample code, and TSQL programming tricks.
The bimonthly update on energy news from Steve Jones, focusing mostly this month on wind power.
The bimonthly update on energy news from Steve Jones, focusing mostly this month on wind power.
The bimonthly update on energy news from Steve Jones, focusing mostly this month on wind power.
What happens if you allow people to be in control of their own computers? Are we putting the inmates in charge of the asylum?
In my previous editorial on this topic, I stated that the An Exceptional DBA is defined more by what they do than what they know. Judging by the responses, there is little disputing this fact among DBW readers. However, before we accept technical knowledge as a "given", and move on, I'd like to consider the […]
Gaining insight into my SQL Server standard and Windows logins has historically been a challenge in terms of determining password changes, failed login attempts, etc. I have noticed that you have experienced the same issue with your tip entitled 'When was the last time the SQL Server sa password changed' and I have noticed some information in the forums on the topic as well.
We have been discussing SQL Server 2005 Express Edition replication-specific features, investigating authentication mechanisms that are available in order to accommodate connection attempts from remote clients interacting with SQL Server-based distributor via Internet Information Services. We will continue coverage of this topic here.
Some of the features that seem to make LINQ very attractive also seem to require granting table level access to data, something Steve Jones doesn't like.
By Steve Jones
A customer was testing Redgate Data Modeler and complained that it auto-generated PK names....
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers