Runtime Code
Do you test your code? What about code that is generated by applications and executed at runtime. Is that tested well? Steve Jones wonders.
Do you test your code? What about code that is generated by applications and executed at runtime. Is that tested well? Steve Jones wonders.
In-Memory table or what Microsoft refers to as In-Memory OLTP, or Hekaton is a new type of table is available with SQL Server 2014. In this article Greg Larsen discusses the different types of indexes you can place on your In-Memory tables, and how those indexes support different search criteria.
Join Red Gate for a free seminar on November 15 (the day before SQL Saturday Oregon). Steve Jones and Grant Fritchey, SQL Server MVPs, will present best practices for SQL Server version control, continuous integration and deployment, in addition to showing Red Gate tools in action.
This tip will guide you through a simple example to illustrate how you can use the SQL Server Distributed Replay feature to replay a simple SQL Server trace file that contained two sessions executing statements concurrently.
In which Phil Factor wonders why all the different cloud storage offerings are so different, sparse in their features, crude and incompatible
Today Steve Jones talks about the prospect of cyberwar and the potential impacts on corporate systems. Perhaps we ought to be building better, more secure software.
I demonstrate how to monitor and troubleshoot Service-Broker-task execution in the context of a database-maintenance process.
This metric counts the number of principals who are members of the sysadmin fixed server role. SQL Server relies on role-based security to manage permissions. If multiple IT system administrators have permissions to set up new SQL Server logins, they might be inclined to do so as part of the sysadmin role. Adding a normal user to the sysadmin role could pose a security risk and is not recommended unless the principal is highly trusted.
Maybe the best way of helping the busy database professional to get started with practical PowerShell-based administration is to pull together all the essential community cmdlets into a toolkit for the POSH DBA, and explain how and why you'd use them.
SQL Server MVP Brian Kelley brings us a great new article that solves a problem that might help your security. In this short piece, we learn how we can use logon triggers to block users based on their IP address.
By HeyMo0sh
One of the biggest challenges I’ve faced in cloud operations is maintaining clear visibility...
By Steve Jones
I come to Heathrow often. Today is likely somewhere close to 60 trips to...
By Brian Kelley
If your organization is spending money, then meaningful results are a must. Pen testing...
Comments posted to this topic are about the item Fun with JSON II
Comments posted to this topic are about the item Changing Data Types
Comments posted to this topic are about the item Answering Questions On Dropped Columns
I have some data in a table:
CREATE TABLE #test_data
(
id INT PRIMARY KEY,
name VARCHAR(100),
birth_date DATE
);
-- Step 2: Insert rows
INSERT INTO #test_data
VALUES
(1, 'Olivia', '2025-01-05'),
(2, 'Emma', '2025-03-02'),
(3, 'Liam', '2025-11-15'),
(4, 'Noah', '2025-12-22');
If I run this query, how many rows are returned?
SELECT t1.[key] AS row,
t2.*
FROM OPENJSON(
(
SELECT t.* FROM #test_data AS t FOR JSON PATH
)
) t1
CROSS APPLY OPENJSON(t1.value) t2; See possible answers