SQLServerCentral Article

Dynamic Management Objects

These are not the DMO bits you are thinking of from SQL Server 2000. SQL Server 2005 introduces a new way of digging into the inner workings of the server with both Dynamic Management Views and Dynamic Management Functions. Longtime SQL Server guru Christoffer Hedgate looks at these new ways of understanding your server.

External Article

Counting Parents and Children with Count Distinct

The aggregate functions in SQL Server (min, max, sum, count, average, etc.) are great tools for reporting and business analysis. But sometimes, you need to tweak them just a little bit to get exactly the results you need. For example, if your manager came to you and asked for a report on how many sales have been made to your clients and how large they were, would you know how to get the data you need efficiently? Mark ran into something like this recently and here's the approach he took to solve the problem.

Technical Article

SQL Server 2005 DB Snapshot: Imperfect Yet Useful?

Database Snapshot (DB Snapshot for short) is a new tool offered by SQL Server 2005. Database snapshots can be used to protect against user errors, by creating a "snapshot" of your data that you can refer to later if you need to recover data or database objects that were accidentally (or even intentionally) updated or dropped. While the feature is quite useful, it doesn’t provide a 100% guarantee against user errors.

Technical Article

Encrypting Without Secrets

Do you have a Web site or other system that deals in secrets of any sort? It seems like every time I give a security talk, people ask how to deal with the sticky problem of storing secrets. Connection strings with passwords are an obvious problem. You're better off simply using integrated security to get rid of those secrets, at least with SQL Server™, or an Oracle database. But what about credit card numbers and other financial or personal information? Can encryption help?

Blogs

SQL Server Journey Part 2: Modern Era (2017 – 2026) – AI/Cloud First

By

Following up on my Part 1 baseline, the journey from 2017 onward changed how...

Google Moves Up Post-Quantum Cryptography Timeline

By

In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...

The Book of Redgate: No Politics

By

In today’s world, this might mean something different, but in 2010, we had this...

Read the latest Blogs

Forums

An Unusual Identity

By Steve Jones - SSC Editor

Comments posted to this topic are about the item An Unusual Identity

Prompt Requests

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Prompt Requests

T-SQL in SQL Server 2025: JSON_OBJECTAGG

By Steve Jones - SSC Editor

Comments posted to this topic are about the item T-SQL in SQL Server 2025:...

Visit the forum

Question of the Day

An Unusual Identity

What values are returned when I run this code?

CREATE TABLE dbo.IdentityTest2
(
     id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
     somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
    somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
 id
 FROM dbo.IdentityTest2

See possible answers