The Challenges of Being Safe
Securing your data is a challenge. Steve Jones has a few comments no just how hard it can be to obfuscate your production data as you move it to development environments.
2009-03-09
875 reads
Securing your data is a challenge. Steve Jones has a few comments no just how hard it can be to obfuscate your production data as you move it to development environments.
2009-03-09
875 reads
Securing your data is a challenge. Steve Jones has a few comments no just how hard it can be to obfuscate your production data as you move it to development environments.
2009-03-09
644 reads
Securing your data is a challenge. Steve Jones has a few comments no just how hard it can be to obfuscate your production data as you move it to development environments.
2009-03-09
641 reads
Debugging capability in SSMS was a long sought feature by users and finally the Microsoft SQL Server team decided to provide this feature in SQL Server 2008.
2009-03-09
4,514 reads
SCHEMA BINDING is commonly used with SQL Server objects like views and User Defined Functions (UDF). The main benefit of SCHEMA BINDING is to avoid any accidental drop or change of an object that is referenced by other objects. A User Defined Function (UDF) may or may not access any underlying database objects, but in this tip we show how using SCHEMA BINDING with a UDF can improve performance even if there are no underlying objects.
2009-03-09
4,200 reads
With a new version of SQL Server being released every 2-3 years now, what does that mean for support from Microsoft? What about from DBAs?
2009-03-07
526 reads
With a new version of SQL Server being released every 2-3 years now, what does that mean for support from Microsoft? What about from DBAs?
2009-03-07
62 reads
With a new version of SQL Server being released every 2-3 years now, what does that mean for support from Microsoft? What about from DBAs?
2009-03-07
813 reads
2009-03-06 (first published: 2008-04-07)
31,876 reads
Check out this collection of best practices, troubleshooting advice and perfomance tips for working with SSRS in SQL Server 2005.
2009-03-06
6,137 reads
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Prompt Requests
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers