Data Masking: Static vs Dynamic
Learn about how static data masking differs from dynamic masking and learn which one might be best for your organization.
Learn about how static data masking differs from dynamic masking and learn which one might be best for your organization.
Learn how to build conditional logic when writing SQL code using IF, BEGIN, END, ELSE, and ELSEIF logic.
How do we set about improving the quality of data governance within an organization? What are the priorities? Data Governance is generally considered to mean providing clear roles, responsibilities, policies, principles, and organizational structures that can ensure that data is managed well, in a way that benefits the whole organization. Where do you start?
Some people might seem like they are from the future, but their experience is just shining through.
This article covers tips on establishing, enhancing, and empowering collaboration, communication, and governance on Cloud Transformation projects.
In any database, mismanagement of transactions often leads to contention and performance problems in systems that have many users. As the number of users that access the data increases, it becomes important to have applications that use transactions efficiently. This guide describes the locking and row versioning mechanisms the SQL Server Database Engine uses to ensure the physical integrity of each transaction and provides information on how applications can control transactions efficiently.
Learn how to use Python code with Azure Data Studio to work with SQL Server data.
Steve talks about some of the Intelligent Query Processing improvements in SQL Server 2022.
In this article, we look at various ways to convert problematic data in SQL Server by using TRY_CAST, TRY_CONVERT, and TRY_PARSE.
Redgate’s database cloning technology is getting an upgrade: Multi-RDBMS, instance-level clones, and support for containerized workflows. Automate DevOps test data for fast quality releases across your software organization. Learn more and gain first access by joining the early access program!
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers