Recently a need resurfaced to explore the foreign key tree (hierarchy/genealogy) as it related to a specific table within a database. As I pulled out the script from the repository, I realized there was some […]
At the urging of a friend, this script is being updated for those that are dealing with Case Sensitivity. The first few rounds, I neglected Case Sensitivity and never tested for that. It makes sense […]
Last month I published an update to my Foreign Key Hierarchy script. Today, I am providing a new update for that script. A friend (Rémi Grégoire) helped out with some mods to this script. The […]
Today I would like to revisit a post of mine that is rather old. More precisely, the script in that post needs revisiting. This is one of my more favorite scripts and I still have […]
One of the things that should seem very commonplace to a data professional is the effort to become a lazy DBA. A lazy DBA is not a bad thing. It just means the DBA works hard to automate the repetitive mundane tasks that may be tedious and/or time consuming.
I have personally participated in quite a large number of these TSQL Tuesday events – despite not being every single one. This is a roundup of my personal participation across the years.
We all have our favorite scripts, tools or utilities. Those are the things that help make our jobs easier. In this article, I share with you a poor mans audit solution to help catch unwanted permissions changes.
Templates are a powerful tool in so many trades and crafts. From decals and stickers all the way up to the largest cruise ships in the world, templates can be found everywhere in just about everything that do.
In SQL Server, templates are readily available for your use in so many different ways that I am sure we are unaware of most of them.
Free workshop on SQL Server leading up to Summit 2017 that will provide attendees an alternate means to increase affordable learning opportunities during the week.
A fundamental component of SQL Server is locking and locks. The locking mechanism helps to control access to resources to help maintain data integrity.