Beginning Database Design - Spot the Flaws
A new series by Steve Jones that tackles a basic design of a few tables. Read the scenario, look over this design, and see if you can find the problems.
A new series by Steve Jones that tackles a basic design of a few tables. Read the scenario, look over this design, and see if you can find the problems.
This handy control gives you everything you need to control how users input usernames, passwords, select servers, and choose connection types.
This article, the second in a series, discusses what items could be contained in the enterprise architecture and touches briefly on how to organize the objects.
Have you ever been asked for information you couldn't provide because you didn't have an historical monitoring tool? Try this
It's the time of year where employment benefits renew for many US employees. Steve Jones talks about how much your company should care about your health.
A few comments on the news of the past week: SQL Server 2008 CPT5, a 1.6SSD Array, Non-Compete agreements and more.
The Declarative Management Framework is a new policy based management framework included with the upcoming SQL Server 2008. Using this feature administrators can define policies to govern their SQL Server environments much like in the Windows environment. This article, written based on the SQL Server "Katmai" July CTP introduces you to the DMF and shows you how you can perform policy management.
Robyn and Phil return with some fresh ideas about how to import text files into SQL Server, without resorting to DTS or SSIS scripting. They go on to show how much can be done in TSQL
The scheduling system in SQL Server is quite flexible and powerful, but can be confusing at times. Peter He looks at some of the advanced options you have in automating the various jobs on your server.
This article looks at fuzzy testing and how to build a provider for your own use.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Prompt Requests
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers