Lossy data and incorrect data
Your copier could change data when creating an image. Phil Factor has some words of caution.
Your copier could change data when creating an image. Phil Factor has some words of caution.
In this article Greg Larson outlines the exciting new features that come along with SQL Server 2014. He'll also let you know where you can download CTP1, as well as where you can find additional resources related to SQL Server 2014.
Specialized tasks like cryptography require external libraries that are not available in SQL Server. Methods for such tasks can be compiled in a .NET language and deployed to SQL Server as a CLR assembly where the assembly's methods can be referenced by SQL Server stored procedures and functions.
A few recent Patch problems have Steve Jones concerned about the directions we are going with software.
Join Red Gate for a free seminar on September 20 (the day before SQL Saturday San Diego). SQL Server MVPs, Steve Jones and Grant Fritchey will present informative sessions featuring best practices for SQL Server database administration, in addition to showing Red Gate tools in action.
Some SQL problems are intriguing because, just when good methods emerge and are accepted, other alternative solutions are discovered. The fun of exploring problems such as 'Gaps and Islands' is all the greater when we have a thorough test-harness to try out the alternative solutions.
Steve Jones notes that SQL Injection is still a problem, and while it might be for some time to come, we should not be adding to the issues. Learn how to write secure code.
This PASS VC Webinar will take place August 14, 1PM EDT. Creatively resolving differences and negotiating mutually beneficial agreements is crucial in all walks of life. It’s especially important and challenging in the IT industry where soft skills are not necessarily prevalent. ??In this session, we’ll introduce the basic concepts and precepts that will aid you in negotiating better agreements with your neighbors, peers and co-workers, and even your boss.
K. Brian Kelly is trying to use SQL Server's built-in encryption and sees there are three different options available for an asymmetric key, corresponding to key length. What's the impact of the key length?
Thank you to everyone who participated in T-SQL Tuesday #198! When I wrote the...
Efficient query performance in Amazon Redshift often comes down to how well you manage...
By gbargsley
Welcome back to PowerShell Strikes Back. We’re three weeks in, and the training is...
Recently, our dev teams approach me for advice on improving their huge heap table...
After upgrading 2 Merge Replicated databases to SQL 2022 and re-establishing the Merge Replication...
Comments posted to this topic are about the item Why Your Index Isn't Being...
What are the distance metric algorithms that can be used in VECTOR_DISTANCE()?
See possible answers