Call for Speakers - SQL Saturday Pittsburgh
SQL Saturday #440 is coming to Pittsburgh on October 3, 2015. Now is the time to submit if you'd like to speak at the event.
SQL Saturday #440 is coming to Pittsburgh on October 3, 2015. Now is the time to submit if you'd like to speak at the event.
Building (or rebuilding) a Columnstore index can be a resource intensive operation. In this article, Denzil Ribeiro describes the index rebuild process and index maintenance for clustered Columnstore indexes in SQL 2014.
Detecting file differences on two different web servers using T-SQL.
The latest version of tSQLt is now available with some SQL Prompt snippets to help you get started.
An invitation to hack United's IT systems has resulted in vulnerabilities being found and hackers rewarded for disclosing the issues.
Tim Smith looks at what to take into consideration before building a design to archive old data in SQL Server databases.
Steve Jones discusses the decision to hire someone that fits in with your culture at work, and what that means.
Unlike some other industrial-strength database servers, SQL Server lacks a built-in mechanism for protecting individual data records, called row-level security. This stairway level explores why you might want to use such a low-level granularity of data access security and how you can implement row-level security.
One of the more confusing statistics in Oracle is one called the clustering factor. Associated with an index, it's actually dependent on the table data, more specifically the distance between 'jumps' for a given index key. Commonly, a 'jump' is the number of blocks between rows containing the given index key starting with the first block found containing that key. If that sounds confusing don't despair, David Fitzjarrell explains in detail.
An amazing visualization of basketball players has Steve Jones encouraging you to find your own pet project and showcase some skills.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers