Fixing Your Identity
If you use identity values, chances are that at some point you will need to find more information about the next value or reset the seed. This article looks at how you can accomplish this.
If you use identity values, chances are that at some point you will need to find more information about the next value or reset the seed. This article looks at how you can accomplish this.
This document (divided in chapters for your convenience) describes how to design a secure, scalable, highly available, and manageable Internet data center that is based on Microsoft products. This documentation examines the major challenges to consider when designing an Internet data center architecture and how this design addresses these challenges.
This webcast is scheduled for Tuesday, January 15, 2002 at 10:00 AM Pacific time.During this session, we will show a practical approach to analyze performance tuning problems that involve Microsoft SQL Server lock monitoring data. We will briefly discuss sp_who2, sysprocesses, and syslocks.
Should you use this book to prepare for the 70-100 exam? Read the review and find out!
The major part of the article, however, is dedicated to a topic that often confuses people and leads to some of the strongest disagreements among IT professionals and developers: the benefits and drawbacks of enforcing security in the middle (or business) tier versus the data tier.
Happy Holidays database administrators! As a parting present before you go home for your year-end break, Microsoft has announced a security problem in SQL Server 7.0 and 2000.
Please join Jim Gray, Distinguished Engineer at Microsoft Research, for this Q&A Session. Jim, the father of Structured Query Language, has been looking at LARGE databases like Google, Hotmail, BarBar, CERN, EOS/DIS, Internet Archive, and others that are either at a Petabyte or will grow to a petabyte scale in the next year or so.
There are times when we need to know that rows of data that meet specific criteria exist in a table. There are 2 basic ways to find this information: COUNT() and EXISTS(). Here are some examples.
See how to configure and troubleshoot an HTTP connection to Analysis Services over both the Internet and an intranet. We will show you how to configure Microsoft Internet Information Services (IIS), and discuss the different security options for IIS in regard to Analysis Services.
Alxander Chigrik presents some useful User Defined Functions you can add to your SQL Server.
I’m hosting a free webinar at MSSQLTips.com at the 19th of December 2024, 6PM...
By Steve Jones
I looked at row_number() in a previous post. Now I want to build on...
Recently I received a cry for help over Teams. The issue was that an...
Given the following table and query, this will return any records(based on message_id) that...
How to merge two tables with unlike fields. I have two table with one...
Hello, First of all, I find it odd/annoying that I can't exclude a Project...
I have this data in a SQL Server 2022 table:
player yearid team HR Alex Rodriguez 2012 NYY 18 Alex Rodriguez 2013 NYY 7 Alex Rodriguez 2014 NYY NULL Alex Rodriguez 2015 NYY 12 Alex Rodriguez 2016 NYY 9If I run this code, what are the results returned in the hrgrowth column?
SELECT player , yearid , hr , hr - LAG (hr, 1, 0) IGNORE NULLS OVER (ORDER BY yearid) AS hrgrowth FROM dbo.playerstats;See possible answers