This article gives an overview of SQL Schema and its usage in SQL Server.
Read more »

This article gives an overview of SQL Schema and its usage in SQL Server.
Read more »In this article, we will learn to rename tables in SQL Server. sp_rename is a built-in stored procedure which helps to rename user tables in the SQL Server. During the software development life cycle, we might be faced with various scenarios that required to rename the existing tables in the database. For example, the tables which are created in the SQL Server might be needed to be renamed, because of the software version upgrades, bug fixing or other various development requirements. These and similar reasons can make renaming tables important. So, in this article, we will particularly focus on how to rename the tables in SQL Server.
Read more »This article explores the SQL Server PRINT statements, and its alternative SQL Server RAISEERROR statements to print messages in a query.
Read more »Microsoft SQL Server and MySQL, both are quite well-established database engines. In our role as a DBA, at some given time point we require T-SQL straddling between both database engines unites Select, Insert, Update, Delete and some other…
Read more »This article explores T-SQL RegEx commands in SQL Server for performing data search using various conditions.
Read more »This article gives an overview of SQL UPPER function and SQL LOWER function to convert the character case as uppercase and lowercase respectively.
Read more »In this article, we will explore the process of SQL Delete column from an existing table. We will also understand the impact of removing a column with defined constraints and objects on it.
Read more »In this article, we’ll take a look at a brief TSQL history and a few examples of loops, conditionals, and stored procedures
Read more »This article explains the process of performing SQL delete activity for duplicate rows from a SQL table.
Read more »With an understanding of what SQL injection is and why it is important to an organization, we can shift into a discussion of how to prevent it. We ultimately want systems where SQL injection is impossible or very difficult to pull off. We then want systems where exploiting bugs is slow, laborious, and likely to raise monitoring alarms within an organization when attempted. The trio of layered security, prevention, and alerting can provide an immense advantage against not only SQL injection, but other data security threats.
Read more »Many security vulnerabilities are discovered, patched, and go away forever. Some linger and continue to plague software development and will continue to do so for years to come. Setting aside social engineering and non-technical attacks, SQL injection remains one of the top security threats to our data, as well as one of the most misunderstood.
Read more »In this article, we will explore SQL Server ALTER TABLE ADD Column statements to add column(s) to an existing table. We will also understand the impact of adding a column with a default value and adding and updating the column with a value later on larger tables.
Read more »In this article, we will review how to construct and execute dynamic SQL statements in SQL Server with different examples.
Read more »This article explores the SQL Server PERCENT_RANK analytical function to calculate SQL Percentile and its usage with various examples.
Read more »This article gives an overview of the SQL STUFF function with various examples.
Read more »As SQL professionals, we often have to deal with XML data in our databases. This article will help you walk through several examples of using ‘FOR XML PATH’ clause in SQL Server.
Read more »In this article, we will demonstrate T-SQL metadata functions available in the SQL Server.
Read more »In this article, we will learn how to create stored procedures in SQL Server with different examples.
Read more »I have seen that SQL developers use varchar(max) data while designing the tables or temporary tables. We might not be sure about the data length, or we want to eliminate the string or binary truncation error.
Read more »This article gives an overview of the SQL Server DBCC FREEPROCCACHE command and its usage with different examples.
Read more »This article explores the SQL Server Lead function and its usage with various examples.
Read more »This article gives an overview of the SQL DROP TABLE statement to remove one or more tables from a database.
Read more »In this article, we will show how to use the SQL intersect logical operator using different examples.
Read more »In relational databases, data is structured using various database objects like tables, stored procedure, views, clusters etc. This article aims to walk you through ‘SQL VIEW’ – one of the widely-used database objects in SQL Server.
Read more »One shared characteristic among popular data visualization tools such as Power BI is the ease at which data can be extracted from a variety of disparate data sources, usually at a click of a button, as shown in Figure 1. Such convenience, though, tends to come at a cost as you often have little control over how background scripts used to extract data are generated. Yet, this should be of utmost concern for data architects and BI developers alike as rarely do you find auto-generated scripts that are efficient and optimal. In this article, join me as I put on my DBA hat and trace, monitor and review SQL batch statements that are auto-generated by the Get Data feature in Power BI using SQL Server Extended Events.
Read more »© 2023 Quest Software Inc. ALL RIGHTS RESERVED. | GDPR | Terms of Use | Privacy