Joe Celko reminisces about the origins of databases and one of the early pioneers, Charles Bachman. He explains how pointer chains were used to traverse data in the NDL standard and referential integrity that we use today.
Developers need to consider not only system performance when writing code, but also how readability impacts code maintenance.
Nat Sundar explains the different ways to load JSON data into SQL Server, along the way also covering the use OpenRowset and OpenJSON functions to manage JSON data effectively.
Governments are requiring better security, and Steve wishes the US would follow.
Describe and provide a set-based method that takes a multiple character split term and returns as a table
When using Transparent Data Encryption, you might wonder “What is the state of my transparent data encrypted database?” Read on to learn the many different states that a transparent data encrypted database might go through.
TEMPDB Enhancements in SQL Server 2016 - By default enforced to follow best practices.
The key challenge for application developers is to build a foolproof system to ensure data security. This is not only more intense, but more complex these days, as many organizations are planning to move their applications to the cloud. Read on to learn more.
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
By Steve Jones
I had an idea for an animated view of a sales tool, and started...
Comments posted to this topic are about the item GPX distance and time analysis...
Comments posted to this topic are about the item The DBA is Dead; Long...
Comments posted to this topic are about the item Changing the AG Listener
In SQL Server 2025, if I want to remove an IP from a listener, what do I do?
See possible answers