Test-Driven Development (TDD) has a misleading name, because the objective is to design and specify that the system you are developing behaves in the ways that the customer expects, and to prove that it does so for the lifetime of the system. Michael Sorens starts an introduction to TDD that is more of a journey in six parts.
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment.
One option to get notified when TempDB grows is to create a SQL Alert to fire a SQL Agent Job that will automatically send an email alerting the DBA when the Tempdb reaches a specific file size. This tip explains how to set it up.
Here are seven practical tips for any 'accidental DBA' or developer, faced with having to deploy an upgrade to a database live to production, in a development environment that is in the early stages of getting the database code “house in order".
Checking program code into source control is a daily ritual for most developers, but versioning database code is less well-understood. Grant Fritchey argues that getting your databases under source control is not only vital for the stability of development and deployment, but it will make your life easier when something does go wrong.
During a transaction, data is written to the log cache so that it’s ready to be written to the log file on commit, or can be rolled back if necessary. When the log cache is being flushed to disk, the SQL Server session will wait on the WriteLog wait type. If this happens all the time, it may suggest disk bottlenecks where the transaction log is stored.
Many DBAs back up their user databases, but not their system databases. Whatever the reason for the lack of a backup, John Grover explains how to save yourself (mostly) should you ever find yourself with no viable master database and no good backup.
Red Gate’s running a half-day training workshop at their UK head office in Cambridge on Aug 8. It’ll show you how to link your database source control repository to your build system as the starting point for continuous integration.
There times when you need to write T-SQL code that creates specific T-SQL Code and executes it. When you do this you are creating dynamic T-SQL code. When writing dynamic T-SQL you need to understand how dynamic code opens the possibilities for a SQL injection attack.
Dynamic Management Views (DMVs) are a significant and valuable addition to the DBA's troubleshooting armory, laying bare previously unavailable information regarding the under-the-covers activity of your database sessions and transactions.
A lot of numbers that we use everyday such as Bank Card numbers, Identification numbers, and ISBN codes, have check digits. As part of the routine data cleansing of such codes we must check that the code is valid- but do we? Dwain Camps shows how it can be done in SQL in such a way that it could even be used in a constraint, and keep bad data out of the database.
This article demonstrates a method of importing a data file directly into a temporary table and selectively inserting data from the temporary table into a SQL Server table, all in a single set of SQL commands.
The SSC team has put together a little quiz on database source control to go with Rob Richardson, Robert Sheldon, and Tony Davis' new book, SQL Server Source Control Basics. Do you daydream about source control... or daydream to avoid it?
Although SQL Data Types seem to cause a lot of grief for database developers and can be tricky in their use, we seem to be expected to know all about them, and so it is embarrassing to ask questions about them in forums. Rob Sheldon continues in his mission to answer all those questions that we hesitate to ask.
SQL in the City is coming back to London and Seattle in 2014. The London event will take place on October 24 (before Tech Ed Europe) and in Seattle on November 3 (before PASS Summit). Keep an eye on the event website and @redgate for updates.
Robert Sheldon describes SQL Server's XML Data Type, and shows that it is as easy to configure a variable, column, or parameter with the XML data type as configuring one of these objects with any other datatype
SSIS was designed to be extensible.Although you can create tasks that will take data from a wide variety of sources, transform the data is a number of ways and write the results a wide choice of destinations, using the components provided, there will always be occasions when you need to customise your own SSIS component.
Simply put, Dependency Injection is a design pattern that helps a class separate the logic of creating dependent objects. The result of this separation is a loosely coupled system where there is no rigid dependency between two concrete implementations. This article discusses what Dependency Injection is and illustrates its use in an ASP.NET MVC application.
Recently one way that developers have been looking to address the cookie abuse problem is via a method known as fingerprinting. Peter Shaw shows you how to generate a fingerprint in C# for use in your own projects.
Today's emphasis on responsive web design (RWD) brings many benefits, but can also gloss over important differences in how people actually use different types of devices. Are there lessons from our not-so-distant past that can help us avoid such pitfalls?
Learn how to implement the latest version of jQuery Mobile into a PhoneGap application. jQuery Mobile is a UI framework that gives you a mobile friendly user interface that is both cross-platform and cross-browser compatible, and the combination of the two gives you a realistic mobile experience with very little work involved.
The Apple iPhone has its own rules and standards related to web page rendering. As a result, you may encounter problems and bugs while optimizing a website for the iPhone. This article discusses the most common bugs and solutions to them, and provides some useful tips.
Two veteran Android developers share their experiences of Google I/O 2011 and weigh the value of attending a conference where the presentations are made available online before the conference even ends.