How to Read the Transaction Log File
Have you ever wanted to be able to see the actual transactions that are contained in the transaction log file? Greg Larsen shows you how to browse the transaction log using an undocumented function.
Have you ever wanted to be able to see the actual transactions that are contained in the transaction log file? Greg Larsen shows you how to browse the transaction log using an undocumented function.
In this article we will show some common roles and queries related to Azure SQL Data Warehouse.
Complex data environments sometimes need new techniques to properly manage the information. See how Windocks can help with containers and SQL Server.
Technical debt is a real problem in database development, where corners have been cut in the rush to keep to dates. The result may work but the problems are in the details: such things as inconsistent naming of objects, or of defining columns; sloppy use of data types, archaic syntax or obsolete system functions. With databases, technical debt is even harder to pay back. Robert Sheldon explains how and why you can get it right first time instead.
A gripping expose into the deep, dark world of ANSI_PADDING! What could be more exciting?
The future of the DBA might include lots of asset tracking and financial meetings.
Erin Stellato takes a thorough look at the way DML statements might benefit from In-Memory OLTP, especially with natively compiled stored procedures.
User-Defined Functions (UDFs) are an essential part of the database developers' armoury. They are extraordinarily versatile, but just because you can even use scalar UDFs in WHERE clauses, computed columns and check constraints doesn't mean that you should. Multi-statement UDFs come at a cost and it is good to understand all the restrictions and potential drawbacks. Phil Factor gives an overview of User-defined functions: their virtues, vices and their syntax.
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
Comments posted to this topic are about the item An SSIS Upgrade
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers