Finding a Break
A year of remote work has made life hard, and harder to get a break from the same environment you are in most of the time.
A year of remote work has made life hard, and harder to get a break from the same environment you are in most of the time.
A frequent question among those learning about DevOps is "How do we do code reviews in this automated process?". Grant Fritchey shares three options - and a word of caution - to ensure you can appropriately understand the changes happening in your system.
Keeping databases secure is critical. In this article, Robert Sheldon explains what to monitor for SQL Server security.
I was asked to load multiple Excel files, each with multiple Excel worksheets. I found a very easy way to complete this in SSIS using a Script Task. This article will explain how I did this. For this example, I have two Excel files, File1.xlsx and File2.xlsx, as shown here: Each Excel File has three […]
In this article we will focus on Power Apps canvas apps which are natively optimized for mobile devices and we will look at potential use cases for canvas apps.
Migration to the cloud and PaaS solutions has accelerated in the past years, and many organizations now manage hybrid estates. To reflect this, the latest release of SQL Monitor adds Azure SQL Managed Instances to its list of supported cloud platforms. This article explains how to monitor performance and activity for Azure SQL Managed Instances using SQL Monitor, with advice on monitoring hybrid estates and migrating from on-prem to Azure SQL Managed Instance.
A look at one way to detect fraud using R and a machine learning model.
Join Microsoft's Rohan Kumar, and a full team of Azure SQL experts, for Innovate Today with Azure SQL. This free digital event from Microsoft lets you choose the sessions and technical demos that are most interesting to you and focus on the capabilities and possibilities that you want to learn more about.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers