Requiring Technical Debt Payments
Steve found someone using an interesting approach to get developers to address some technical debt.
2025-09-08
141 reads
Steve found someone using an interesting approach to get developers to address some technical debt.
2025-09-08
141 reads
Considering introducing continuous database integration? Learn the principles in this ThoughtWorks webinar hosted by Pramod Sadalage, expert in this discipline and author of several books about database refactoring and development.
2021-06-09
In this article, Shel Burkow uses the SQL execution plan from the previous article to write a program in Scala.
2021-04-20
This article is an interesting approach to solving a data transformation problem in SQL and Scala. Shel Burkow uses a SQL execution plan for software design.
2021-03-18
Making sure your SQL Servers are secured against malicious users is difficult. The United States Defense Information Systems Agency (DISA) publishes a set of guidelines for organizations securing different pieces of software that connect to the US Department of Defense’s networks (DoD). Whether you’re working with the DoD or not, these Security Technical Implementation Guides (STIGs) are a good resource to help you understand potential security vulnerabilities and mitigate them.
2021-02-22
When inserting rows into a heap, SQL Server must sometimes update the PFS page which can PFS contention and affect performance. In this article, Uwe Ricken demonstrates how to measure PFS contention.
2021-01-25
To prevent data change anomalies, a database should be normalized. Did you know that there are 10 normal forms? In this article, Joe Celko reviews normalizing databases including commonly used normal forms.
2020-12-15
All queries run fast against columnstore indexes, right? In this article, Edward Pollack demonstrates some query patterns that don’t perform well and how to get around the issues.
2020-09-24
2020-06-27
208 reads
Since many of you choose to host a blog on Wordpress, here are a few things to think about when securing your site. Some of these might also be things you check for your other applications accessing SQL Server.
2019-09-23
2,865 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
Hi, our peer who owns a remote mysql server from which we extract warehouse...
What is returned as a result set when I run this command without a new seed value?
See possible answers