“We love to debate minutiae”
I am guilty as charged. The quote was in reference to how people argue about details in fitness or finances that are more detailed than is useful to them....
2026-03-30 (first published: 2026-03-13)
158 reads
I am guilty as charged. The quote was in reference to how people argue about details in fitness or finances that are more detailed than is useful to them....
2026-03-30 (first published: 2026-03-13)
158 reads
I saw a question asking about the next sequence value and decided to try and answer it myself. I assumed this would be easy, and it was, but I...
2026-03-30
7 reads
As someone who works in DevOps, I’m always focused on creating systems that are efficient, scalable, and reliable. But when it comes to the cloud, one critical piece often...
2026-03-30 (first published: 2026-03-15)
143 reads
I will be presenting my latest session, Documenting Your Work for Worry-Free Vacations, in-person twice in May 2026. With summer vacations coming up, this is a perfect time of...
2026-03-30
5 reads
But as I've matured over the years, I came to realize that I needed to ask a critical question, "Who am I doing this for?" When I agree to...
2026-03-30
5 reads
Following up on my Part 1 baseline, the journey from 2017 onward changed how we look at the “Engine.” We moved from Service Packs to a faster world of...
2026-03-28 (first published: 2026-03-27)
15 reads
Continuing from Day 5 where we covered notebooks, HuggingFace and fine tuning AI now Day 6 is inside of AI , how AI understand us, as computer do not...
2026-03-27 (first published: 2026-03-06)
170 reads
A ton of new features for Microsoft Fabric were announced at the Microsoft Fabric Community Conference (FabCon Atlanta 26) last week (see the FabCon keynote here). There were 8000 attendees! Here...
2026-03-27 (first published: 2026-03-26)
18 reads
EightKB is back again for 2026! The biggest online SQL Server internals conference is back…it’s all happening on August the 20th! We’ve open our call for speakers, you can...
2026-03-27 (first published: 2026-03-18)
173 reads
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography are susceptible to Shor's Algorithm in quantum cryptography. Cracking those algorithms with classical computing is...
2026-03-27
59 reads
By Brian Kelley
But as I've matured over the years, I came to realize that I needed...
By alevyinroc
I will be presenting my latest session, Documenting Your Work for Worry-Free Vacations, in-person...
By Steve Jones
I saw a question asking about the next sequence value and decided to try...
I've read a few posts regarding what we use to design DB models and...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers