Some of the features that seem to make LINQ very attractive also seem to require granting table level access to data, something Steve Jones doesn't like.
Along with some best practices, SQL Server MVP Hilary Cotter shares a log shipping setup process from start to finish.
Robyn and Phil go back to basics and hammer out some basic String-handling User Functions in TSQL, based on Python examples. Plenty of sample code, and TSQL programming tricks.
The bimonthly update on energy news from Steve Jones, focusing mostly this month on wind power.
The bimonthly update on energy news from Steve Jones, focusing mostly this month on wind power.
The bimonthly update on energy news from Steve Jones, focusing mostly this month on wind power.
What happens if you allow people to be in control of their own computers? Are we putting the inmates in charge of the asylum?
In my previous editorial on this topic, I stated that the An Exceptional DBA is defined more by what they do than what they know. Judging by the responses, there is little disputing this fact among DBW readers. However, before we accept technical knowledge as a "given", and move on, I'd like to consider the […]
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers