Cloning a SQL Server login with permissions that match another login is a common task. In this post, Jeffrey Yao shows how this an be done using PowerShell.
SQLBits 2017 has been announced. The conference will take place on April 5-8, 2017 in Telford, UK.
Enhance the functionality of your SSAS Tabular and PowerBI output, by understanding HOW-, WHY- and WHEN to leverage the power of DAX to create text, date or Boolean measures.
I have seen three common responses to database messes. My favorite is nuclear.
Learn how to leverage Azure Active Directory when connecting to Azure SQL Database from applications or services in a non-interactive manner, by relying on token-based authentication.
Why is it that we use XML, but with so little enthusiasm when it does so much, and is so feature-rich? Phil Factor argues that there are better ways of doing it, more complete than JSON, but easier to read than XML. To try to convince you, he gives a set of flying demos, using PowerShell and his PSYaml module, to illustrate how YAML can let you work faster, and more accurately.
This week Steve Jones examines the idea of making jobs in SQL Server, first class citizens.
By James Serra
What problem is Fabric Ontology trying to solve? For years, most data conversations have...
By Steve Jones
Recently I ran across some code that used a lot of QUOTENAME() calls. A...
By ChrisJenkins
There are some telltale signs that your growing business has outgrown Excel for your...
Comments posted to this topic are about the item Stairway to Reliable Database Deployment...
Comments posted to this topic are about the item QUOTENAME Quote Parameters
Comments posted to this topic are about the item Limit the Blast Radius
When I use QUOTENAME(), I can optionally provide the character used to surround the string in the result. Can I use any character?
See possible answers