Getting started with SSIS External Configuration File
This article illustrates how to use an SSIS external configuration file to enable the properties of package objects to be dynamically updated at run time.
This article illustrates how to use an SSIS external configuration file to enable the properties of package objects to be dynamically updated at run time.
From castles and dragons to swordfights and spells, this year’s SQL Bits will have it all. Make sure you don’t miss out on our great sessions, from Code Errors to Reliable Releases, to adding some PostgreSQL skills to your repertoire. And come say “hi” to us at the Redgate booth, where we’ll have some news for you. Get 10% off registering with 10REDGATE.
Microsoft combined the power of two powerful tools by announcing the public preview of Azure Automation Visual Studio Code Extension. This article will show you how to get started.
Get an introduction to the Stairway Series and learn about the power of the ScriptDOM library.
In this level of the Stairway to ScriptDOM, we examine the way the tool parses scripts and creates tokens from the text.
Learn how you can query for patterns in the Abstract Syntax Tree to analyze your code.
When a company assembles a lot of data to draw conclusions, that's great. However, when that one company sells data to a number of competitors, that can be a problem.
Information security, whether in databases, applications, or larger IT systems, is based on the principles of Authentication and Authorization, often referred to as AuthN and AuthZ respectively. Likewise, PostgreSQL security involves creating roles that allow access to server resources (AuthN) and then granting privileges to database objects appropriately (AuthZ). Understanding how each of these components work together is essential to effectively manage security in a PostgreSQL cluster.
During development, you'll occasionally need an undo script that drops a group of tables, or you might need to truncate a group of tables and then insert fresh data in order to run some tests. Unless you perform the required actions in the correct dependency order, you'll be tripped up by foreign key constraint violations. This article provides a SQL function that returns the list of tables in the correct dependency order.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Prompt Requests
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers