The Tethered Goat
Phil Factor's a 'tethered goat' database taught in the value of database intrusion detection and of "defense in depth".
Phil Factor's a 'tethered goat' database taught in the value of database intrusion detection and of "defense in depth".
Example of Using Super Keys to Enforce Database Constraints, instead of procedural code
Serget Gigoyan is back with another set of 5 common SSMS tips.
This example demonstrates how to perform a pivot using dynamic headers based on the row values of a table. The article also shows how to pass a temp table variable to a Dynamic SQL call.
You may have already experienced ETL Hell, where you have a large number of similar of SSIS tasks, and a small change, such as an alteration to the network topology, means that they all need to be altered with the correct connection details. Perhaps you should consider creating design patterns for all the standard components of integration tasks in BIML, and generating the SSIS packages from these? Amarendra walks you through the process.
Redgate is hiring someone to manage Simple Talk, a job just like the one Steve has with SQLServerCentral.
Siddharth Mehta shows that R libraries can be used from T-SQL to ingest data from the web into SQL Server.
Aaron Bertrand shows a quick demo that illustrates why you should be very careful about oversizing varchar / nvarchar columns.
PlanTrace Now Supports PostgreSQL The same plan analysis you know from...
By Steve Jones
the kinder surprise – . the point in your early adolescence when you realize...
If you’ve been following my T-SQL Snapshot Backup series, most of what I’ve covered...
Comments posted to this topic are about the item SSRS Is Dead. Here Are...
Comments posted to this topic are about the item The Distance Metric
Comments posted to this topic are about the item The New Wave of Security...
In the new VECTOR_DISTANCE() function in SQL Server 2025, the first parameter is the distance_metric. What is this?
See possible answers