SQLServerCentral.com 5 Year Anniversary
It's been 5 years that this community has been live and Steve Jones takes a short look back at the community as well as announcing a few prizes.
It's been 5 years that this community has been live and Steve Jones takes a short look back at the community as well as announcing a few prizes.
Miguel De Icaza has been a major mover of Mono, the open-source framework for .NET since the get-go. These days he shepherds Mono along from within Novell Inc. At Novell's BrainShare conference, he discussed the latest doings with writer Paul Ferrill.
SQL Server allows multiple triggers on a table, but the order in which they are executed can sometimes cause problems. Author Dinesh Asanka brings us a technique for managing the order of execution for your triggers.
It seems that there is both excitement and confusion surrounding Master Pages and Themes. A big part of the problem is that they always seem to be mentioned in the same breath – like I just did. The reality is that they are two separate but equally important technologies. Each has its own function in ASP.NET but when you use these two technologies together, you get a site design that is amazingly versatile, easy-to-use, and easy-to-adapt. ASP.NET 2.0 provides a whole host of improvements to your web development experience but, in my opinion, these two technologies represent the single biggest reason to migrate your sites to this new platform. Let's take a look at each of these technologies in turn.
The report models introduced in SQL Server 2005 feature a number of ways to customize the data visible to different users and groups: perspectives, model item security, security filters, and opaque expressions. This article describes when and how to use each of these features.
One of the big changes with SQL Server 2005 is the evolution of SQL-DMO to the new SMO managed code assemblies. Author Raj Vasant brings us quite a bit of code to show how this can be used to script your objects.
Will multiple processors or a dual core processor be beneficial to you, and what are the differences between them? These are the questions this article will attempt to lay to rest.
Do you use identity values? Do missing values ever cause problems? Maybe you need to look for missing invoices? Stephen Lasham brings us a technique for finding those missing values in a sequence.
In this article I will show you how you can implement security on a WCF service. There are many options and extensibility points for implementing security in WCF. You can also use specific products, such as the Windows 2003 Server Authorization Manager, together with WCF to implement the authorization requirements of a solution. Out of the box, WCF supports Windows credentials, Username Tokens and X.509 Digital Certificates as security credentials.
InfoPath forms can be saved to XML, these XML Files can later be used in SSIS XMLSource adapter to pull out the data in tables and columns. However, there are some common problems you may meet in these scenarios. This article describes how to work around these potential problems. The issues mentioned in this article is not only specific to InfoPath files, it can also be referenced in other similar situations as well.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers