Constraints and declarative referential integrity
Database systems have powerful features built right in that can ensure the integrity of data. In this article, Joe Celko discusses keys and constraints.
Database systems have powerful features built right in that can ensure the integrity of data. In this article, Joe Celko discusses keys and constraints.
Join the world’s largest gathering of data professionals at this year’s free online PASS Data Community SUMMIT. Connect and network with 1000s of your peers and learn from some of the brightest minds in the data industry. This year’s must-attend online event is completely free, so sign up now to be notified when registration opens.
Forcing users to agree to a new EULA or removing features seems like a bad idea to Steve.
In this article we will look at how to create deep and shallow clones of source data when using Azure Databricks.
Simple Talk editor Kathi Kellenberger announces this year's free global online conference will take place on November 8 - 12. Save the date, and stay tuned for the Call for Speakers coming soon.
We are reaching out to all people that enjoyed SQL Saturday in LA 2017, 2018, 2019, and 2020 events to let you know that the 2021 event is fast approaching. Only 30+ days remain until the June 12 Virtual Data.SQL.Saturday.LA event. Please register soon to reserve your spot by using http://2021sqlsatla.eventbrite.com/ hyperlink, register using a form below or just use a QR code.
Steve looks at a technique that some think will allow more data to be used in research and training.
Summary In this article, we will be looking at some of the useful techniques on how to reduce dimensionality in our datasets. When we talk about dimensionality, we are referring to the number of columns in our dataset assuming that we are working on a tidy and a clean dataset. When we have many columns […]
What do you think the top 10 Database DevOps trends in 2021 are? Redgate has condensed 3,200 survey responses from IT professionals worldwide into a handy infographic. Discover insights such as the top challenge in improving software delivery performance and the correlation between DevOps adoption and high-performing teams.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Prompt Requests
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers