Login creation in SQL Server 2005 for SQL Server Authentication Mode
Its a graphical representation of login creation in SQL Server 2005 for SQL Server Authentication Mode.
Its a graphical representation of login creation in SQL Server 2005 for SQL Server Authentication Mode.
How many of you have ever used SET CONTEXT_INFO in your SQL Server applications? Chances are it is not something you have been exposed to, but new author Yousef Ekhtiari brings us an example of how this particular construct can be used in your application.
For our RAID tests, we once again use Samsung HM321KJ SATA/300 drives. This time, we benchmarked RAID 5 and RAID 6 setups with three to eight hard drives.
In SQL Server 2008 we get a new DATE date type that allows you to store a date without a time.
Licensing SQL Server used to be easy and could be again, though it is still better than licensing Oracle.
An exploration of the process of translating a conceptual model to a logical model, and ultimately, a faithful implementation using T-SQL.
Most enthusiast and mainstream users would consider setting up a RAID array mainly for performance reasons - few really care about data safety. For this reason, the majority of arrays installed consists of only two drives, which run a simple RAID 0 stripe set. Haven't you ever asked yourself how these RAID arrays scale as you increase the number of hard drives?
If you've worked with SQL Server databases for any amount of time, it's practically a given that you've run into slow running queries. Learn how you may be able to improve performance by knowing what to look for in your query designs.
One of the more interesting new features in SQL Server 2005 is the Service Broker. It's not something to help you manage your financial future, nor is it some new program that handles all the instances and their accounts. It's a message queue and SQL Server MVP Srinivas Sampath brings us a look at this new feature with some code to get you going.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers