Load Extended Events via Powershell
Learn how you can load Extended Events with PowerShell, nice and fast.
Learn how you can load Extended Events with PowerShell, nice and fast.
This article will show how to use Windows authentication for AWS RDS SQL Server by setting up an AWS Managed Active Directory and integrate it with an AWS RDS SQL Server instance.
High performing teams must implement a common approach to database migrations so that the database can be included in Continuous Delivery. This ‘kernel’ of Database DevOps leads to better alignment between developers and Ops teams, and increases the throughput of high quality releases. The key for many is Flyway, and this whitepaper explores how this highly configurable migrations tool enables a bespoke migrations-based deployment strategy that is easy to adopt and scale across teams
There are plenty of opportunities to grow your career by sharing knowledge. Steve points out a few today.
Learn how you can query CosmosDB data from Azure Synapse in this walkthrough.
Without a good backup and recovery strategy in place, a DBA should make sure their resume is always up to date. In this article, Greg Larsen discusses what should be considered when developing a backup plan.
In this next level of the Stairway to Biml, we will examine how you can use the information stored in your RDBMS to build packages.
Today Steve asks what you might want out of your local organization devoted to the data platform.
In this article we look at a PowerShell script that can help you deploy database objects to multiple SQL Server instances.
William Brewer explains how to make data governance a continuous organizational activity, based on well-established standards and practices, rather than a knee-jerk response, and which skills and tools will help you achieve compliance, including SQL Data Catalog for discovery and classification of data held in SQL Server.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers