Visit the SQLounge at PASS 2005!
Tried at TechEd and manned by the SQLServerCentral.com crew, this was a great idea. It's going to be at PASS and hosted by James Luetkehoelter.
Tried at TechEd and manned by the SQLServerCentral.com crew, this was a great idea. It's going to be at PASS and hosted by James Luetkehoelter.
Query Analyzer has been a great tool in SQL Server 2000 and while it is superceeded in SQL Server 2005, lots of us will be using it for some time to come. New author Yakov Shlafman brings us some references and tricks for this essential DBA tool.
It is just next week that the PASS 2005 Summit kicks off and we've got some information about our casino party for those attending.
There has been a lot of interest in the web-facing community lately about a new useability feature that goes by a number of different names—XMLHTTP, AJAX, out-of-band requests, and asynchronous client script callbacks, to name a few.
Regardless of the name, this feature provides a way for a standard web page to make calls back to the server, without a traditional page refresh. The user is oblivious to the fact that a server call has occurred, and is not interrupted by it.
In a followup to the recent articles and discussions on interviewing and DBA skills, Sean McCown brings us a new article that looks at one situation that resulted in a rejection. Learn what you might want to work on before your next interview.
n this lesson, we will examine another function / property in the MDX toolset, the .UniqueName function. The general purpose of the .UniqueName function is to return the Unique Name of the object to which it is appended. .UniqueName can be used in conjunction with hierarchies, dimensions, levels, and members, in a manner similar to the .Name function that we examined in String Functions: The .Name Function, and, also like .Name, .UniqueName can be useful in a host of different applications.
In order for a transaction to meet the requirements of ACID, locks are employed to insure data integrity and multi-user access. The scope, or number of rows held by a lock, is referred to as Lock Granularity. This month, we will begin by introducing several different types of lock modes employed by MS SQL.
Less than two weeks away, sessions tried and tested at the PDC, the Microsoft SQL Server development team and gambling with SQLServerCentral.com! Register today!
Continuing on an interview with Raj Gill, SQL Server 2005 Roadshow Presenter by Robert Pearl. Get inside the mind of the co-founder of Scalability Experts.
Confidential until the official release at 9:00am Pacific Time today. Check back after that time to get the big news!
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers