Source Code Security
The code you use may contain security information. Be extra careful in this case, especially when you use encryption.
The code you use may contain security information. Be extra careful in this case, especially when you use encryption.
Arshad Ali demonstrates how you can use the command line interface to tune SQL queries and how you can use SQL Server Profiler to capture the workload for tuning with Database Engine Tuning Advisor.
This alert is raised when the number of hash warnings events in the last hour goes above a specified threshold. A hash warning event means that part of the data processed for a hash operation was written to tempdb during query execution, which can degrade SQL Server Performance.
In which Phil Factor illustrates in TSQL how it is possible to use foreign key constraints to enforce data rules, and illustrates some surprising consequences of using cascading.
Despite being deprecated for many years, Phil Factor explains why RULEs are still hanging on in there in SQL Server 2014.
When you're developing database applications, it pays to check for index scans in the SQL Server query plan cache. Once you've identified the queries, what next? Dennes Torres gives some preliminary guidelines on how to find out why these index scans are being chosen for these queries and how to make the queries run faster and more efficiently.
I had an update statement that took 3 minutes to run after this code change it took 6 seconds.
In this article, Robin Shahan talks about security and how to control access to containers and blobs using shared access signatures (SAS) and stored access policies.
This Friday Steve Jones asks about how you are tackling your career growth as you get older. Are you getting more efficient?
'Temporal' tables contain facts that are valid for a period of time. When they are used for financial information they have to be very well constrained to prevent errors getting in and causing incorrect reporting. This makes them more difficult to maintain. Is it possible to have both the stringent constraints and simple CRUD operations? Well, yes. Dwain Camps patiently explains the whole process.
It's time for T-SQL Tuesday #198! This month's topic is change detection. The post T-SQL...
By James Serra
Model Context Protocol, or MCP, is one of those technical ideas that sounds more...
When starting with AWS RDS Aurora for managing relational databases in the cloud, many...
Ruko Puri Mutiara, Jl. Griya Utama B Blk. D No.1-2, Sunter Agung, Kec. Tj....
BCA KCP Tomang Elok Telpon/wa:0821°8168°291.Jl. Taman Komp. Tomang Elok, Simpang Tj., Kec. Medan Sunggal,...
ITC ROXY MAS, Jl. Kh Hasyim Ashari No.125 Basement 13, Cideng, Kecamatan Gambir, Kota...
In honor of May the fourth and Star Wars (may the force be with you), finish this quote:
"Do, or do not. ..."See possible answers