Target Recovery Interval and Indirect Checkpoint
Indirect checkpoint is the recommended configuration, especially on systems with large memory footprints and default for databases created in SQL Server 2016.
Indirect checkpoint is the recommended configuration, especially on systems with large memory footprints and default for databases created in SQL Server 2016.
Sherlee Dizon looks at the basic differences between char, nchar, varchar, and nvarchar, as well as what to be aware of when using each data type.
Dynamic Data Masking is an exciting new feature in SQL Server 2016, allowing DBAs to centrally set a mask that is returned for a table column instead of the actual data, limiting what information is returned to certain users in a consistent and reliable way. What’s more, Redgate SQL Compare safely and reliably handles your DDM changes. Data Platform MVP Steve Jones explains more.
A guide to using Visual Studio to create U-SQL projects and scripts.
The march to the cloud is ongoing and Steve Jones says you should prepare yourself. Even if your company doesn't move.
Rob Farley looks at information exposed in query plans about residual predicates and actual rows read, showing how Plan Explorer helps identify the issue.
Toady we are going to make a copy and export your DB to Azure Storage. Lets get started.
Today Steve Jones talks about the problem of having code that people are afraid to change or deploy.
Although it is well-known that the best efforts of a development team can be derailed by mistakes in the architecture, design and general governance of a development project, few attempts have been made to describe what needs to be done to increase the chances of success in the development of a database application. William Brewer steps into the breach to itemise what a delivery team needs to succeed.
SSMS has spent years being neglected, merely being kept compatible with SQL Server and its features: But now we have, instead, the promise of monthly delivery of new functionality
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers