SQL Vulnerability Assessment
SQL Vulnerability Assessment is a feature available in the latest versions of SQL Server Management...
Tutorial on SQL (DDL, DML) on the example of MS SQL Server dialect
Introduction This tutorial includes information about SQL (DDL, DML) that I have gathered during my professional life. This is the minimum...
SQL Data Discovery and Classification
With the recent data protection laws and the implementation of GDPR last year, it is imperative for us to know the type of data our...
Basic and Complex Uses of Not Equal Comparison Operator in T-SQL
This article is focused on the T-SQL Not Equal comparison operator (<>) and its uses in basic...
T-SQL SET Operators Part 1: UNION and UNION ALL
In SQL Server, we can combine the same type of data from multiple tables using SET operators. After combining multiple SQL statements, it...
New Features in Visual Studio 2019
Microsoft has recently released the preview version of Visual Studio 2019. Like all previous editions, the latest Visual Studio comes with...
Automatic gathering of SQL Server configuration by using PowerShell
At present, the gathering of SQL Server configuration information is no longer a problem— the...
SQL Server Database Tables Export and Import Methods
When working as a SQL Server database administrator or developer, you cannot live in your isolated SQL Server world without communicating...
Using Trace Flag 3226 to Suppress Log Backup Logging
Introduction Every backup operation in SQL Server is written to the SQL Server Error log. This includes Transaction Log Backups even when...
Column-level and row-level tracking in merge replication
In this article, let us review row-level and column-level tracking options in merge replication and...