Applying SQL Transformations and Handling Missing Values in Azure ML
In this article, we will introduce SQL transformations in action. We will also see how to handle...
Understanding SQL Server Always Encrypted
Security is one of the most important requirements for a data-driven system. Encryption is one of the ways to secure the data. Wikipedia...
The Difference Between Primary Key And Unique Key
“What is the difference between a primary key constraint and a unique key constraint?” This is probably the most frequently-asked job...
Introduction to Row-Level Security in SQL Server
Why Row Level Security Matters? Prior to SQL Server 2016, table-level security was the default...
Passing Data table as Parameter to Stored Procedures
Real-world database applications need to make multiple requests from the front end to the database in order to carry out all sorts of...
Implementing Paging Using OFFSET FETCH NEXT in SQL Server
A database can have hundreds of thousands of records. It is easy to insert and select these records via database management systems like...
Similarities and Differences among RANK, DENSE_RANK and ROW_NUMBER Functions
The RANK, DENSE_RANK and ROW_NUMBER functions are used to retrieve an increasing integer value....
Understanding Difference between EXCEPT and NOT IN Operators
Both EXCEPT and NOT IN operators are used to filter records from a table based on a specific criterion. In this article, we will look at...
Understanding GROUPING and GROUPING_ID Functions in SQL Server
The ROLLUP and CUBE operators are used to return results aggregated by the columns in the GROUP BY clause. The GROUPING and GROUPING_ID...
Logon Triggers in SQL Server
A logon trigger, as the name suggests, is a trigger that fires in response to a LOGON event in SQL...