Have you ever encountered a situation where you mark the constraint as trusted, but the next day, it’s back to untrusted again? This blog post will help you find the cause.
Consultants hate me for this one weird trick. Because I’ll be uncovering all the mess Scalar functions can cause in a series of articles.
This month’s invitation is from Mala Mahadevan. I’ll be covering several of my favourite code standards.
Entering cheats in Lego Video games is incredibly time-consuming. So I’ve used the power of SQL to save a few keystrokes and optimize my cheating experience.
I’m reminding myself how to set up secure CrossDB access. This blog post includes a nifty diagram and follow-along example.
When you look at the Extended Events in the SSMS, is it a local time or server time? Let’s find out.
In previous blog post I’ve shown you how to cheat. This time we’ll learn how to play and score our guesses using TSQL.