Stairway to SQLCLR Level 7: Development and Security
Learn about some Visual Studio features that help with automation, and use them to create an Asymmetric Key and Login.
Learn about some Visual Studio features that help with automation, and use them to create an Asymmetric Key and Login.
Siddharth Mehta walks through how to automatically migrate reports from MS Access to SQL Server Reporting Services (SSRS) without having to rebuild anything from scratch.
Microsoft has changed their engineering to do amazing things in the cloud, especially with SQL Server. We could all learn from this.
Greg Larson looks at how to hide the value of sensitive data by applying Dynamic Data Masking.
In this new chapter we will show how to verify the accuracy of the mining models.
IDEs are wonderful, but tend to lull you out of the good habits of thinking up front about how the code you write will be monitored and tested. So argues Phil Factor.
How we implement algorithms can change the way the world works with our software. Steve Jones wonders if we should be disclosing the algorithms themselves.
Redgate is in an early research phase of a tool that helps provision production-like databases for dev and test in a way that saves both time and storage. The team involved are looking for volunteers to provide feedback on the product as it's developed. If you think you'd be interested in trying out the tool, sign up for the beta program now.
Any SQL Server monitoring tool must gather the metrics that will allow a DBA to diagnose CPU, memory or I/O issues on their SQL Servers. It should also provide a set of accurate, reliable, configurable alerts that will inform the DBA of any abnormal or undesirable conditions and properties, as well as specific errors, on any of the monitored servers. This article provides an in-depth guide to the monitoring and alerting functionality available in one such tool, Redgate SQL Monitor. It focuses on the latest edition (5.0), which includes several key new features, such as performance diagnosis using wait statistics, the ability to compare to baselines, and more.
It sounds simple enough. Either your column will always have a value or it may not. Yet somehow such a seemingly simple decision can become a never-ending debate where database schema begins to resemble superstition and designing effective tables seems more contentious than you expected it to be.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers