<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 02:41:18 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/tsql/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Creating a GUID For Each GUID]]></title><description><![CDATA[What happens when we run into a situation where we need to create a GUID for reach GUID? Check out the solution in the video TSQL: Create A GUID For Each GUID (Unique Identifier For Each Unique Identifier).]]></description><link>http://direct.ecency.com/data/@sqlinsix/5ebpd6-creating-a-guid-for-each-guid</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/5ebpd6-creating-a-guid-for-each-guid</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Fri, 05 Nov 2021 12:24:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e6GEoTLwQXp4SeSfjh6QSYbFYM9CMXpKYY6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Transaction Log Becoming Full Due To Replication]]></title><description><![CDATA[Review the solution and discussion in the video The transaction log for database 'DB' is full due to 'REPLICATION'. We do not want to develop the habit of micro-managing transaction logs, so we should]]></description><link>http://direct.ecency.com/data/@sqlinsix/4qxhak-transaction-log-becoming-full-due-to-replication</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/4qxhak-transaction-log-becoming-full-due-to-replication</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sat, 18 Sep 2021 16:36:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eK8g51qLy7L6o88JLA6fxPgjcicbSWYXkdt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ARITHABORT Settings, Query Speed and Applications Running Queries]]></title><description><![CDATA[Check out the demo and discussion in the video TSQL: ARITHABORT ON and Query Speed. While it may seem like a harmless setting, this setting may affect our queries. We should be aware of how the application]]></description><link>http://direct.ecency.com/sqlserver/@sqlinsix/arithabort-settings-query-speed-and-applications-running-queries</link><guid isPermaLink="true">http://direct.ecency.com/sqlserver/@sqlinsix/arithabort-settings-query-speed-and-applications-running-queries</guid><category><![CDATA[sqlserver]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Fri, 26 Mar 2021 08:31:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dveJG5CfnAFFrz7xBcPyejiTSKJNehmQyo4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Using IF Statements With T-SQL]]></title><description><![CDATA[In the video T-SQL: How To Use If Statements, we look at how to use IF statements with T-SQL. These can be an alternative to CASE WHEN statements in some situations (see video T-SQL: How To Use CASE WHEN]]></description><link>http://direct.ecency.com/data/@sqlinsix/2w4sbw-using-if-statements-with-t-sql</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/2w4sbw-using-if-statements-with-t-sql</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sun, 14 Mar 2021 08:51:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eHYKSuuCBFcgWgDhq6XwU6vjyfGyJ7d1HNe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Easily Getting the Number of VLFs For A Database]]></title><description><![CDATA[As we can see in the video TSQL: Get Number of VLFs, we can obtain the number of VLFs easily but this practice can quickly devolve into busy-work that generates little to no results. Most log issues are]]></description><link>http://direct.ecency.com/data/@sqlinsix/7wfc1w-easily-getting-the-number-of-vlfs-for-a-database</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/7wfc1w-easily-getting-the-number-of-vlfs-for-a-database</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sat, 27 Feb 2021 17:53:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eLm26yvX7XG6R2MwKt4dde7xF2pN3YXQGii?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Transaction Log Becoming Full Due To Replication]]></title><description><![CDATA[Review the solution and discussion in the video The transaction log for database 'DB' is full due to 'REPLICATION'. We do not want to develop the habit of micro-managing transaction logs, so we should]]></description><link>http://direct.ecency.com/data/@sqlinsix/3qgtnx-transaction-log-becoming-full-due-to-replication</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/3qgtnx-transaction-log-becoming-full-due-to-replication</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Wed, 01 Jul 2020 09:57:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eK8g51qLy7L6o88JLA6fxPgjcicbSWYXkdt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Shrinking A File In SQL Server]]></title><description><![CDATA[Check out the solution in the video TSQL: DBCC SHRINKFILE Part I. Depending on the environment and setup, we may be required to shrink a file in SQL Server (such as a log file). Lower environments (generally,]]></description><link>http://direct.ecency.com/data/@sqlinsix/36or5j-shrinking-a-file-in-sql-server</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/36or5j-shrinking-a-file-in-sql-server</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Mon, 29 Jun 2020 08:20:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e9xHWmcZzh9BR5SfFCLLTQNuQXGsCfgLnKQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Using IF Statements With T-SQL]]></title><description><![CDATA[In the video T-SQL: How To Use If Statements, we look at how to use IF statements with T-SQL. These can be an alternative to CASE WHEN statements in some situations (see video T-SQL: How To Use CASE WHEN]]></description><link>http://direct.ecency.com/data/@sqlinsix/49hs3n-using-if-statements-with-t-sql</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/49hs3n-using-if-statements-with-t-sql</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Mon, 22 Jun 2020 08:42:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eHYKSuuCBFcgWgDhq6XwU6vjyfGyJ7d1HNe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Finding Values In One Table That Aren't In Another Table]]></title><description><![CDATA[Check out the solution in the video TSQL: Find Values In One Table Not In Another Table. In the example, we see how to identify data in one table that does not exist in another table. This may be extremely]]></description><link>http://direct.ecency.com/data/@sqlinsix/finding-values-in-one-table-that-aren-t-in-another-table</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/finding-values-in-one-table-that-aren-t-in-another-table</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Fri, 08 May 2020 08:37:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45ePy7JhtbWkcEpruTtEWLvBkLa5WxwM282op?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Getting Open Transactions With DBCC OPENTRAN]]></title><description><![CDATA[Check out the solution in the video TSQL: DBCC OPENTRAN. In honor of one of my favorite DBAs, we look at using the DBCC OPENTRAN. We simulate an example with this technique and show what we see and what]]></description><link>http://direct.ecency.com/data/@sqlinsix/6xqary-getting-open-transactions-with-dbcc-opentran</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/6xqary-getting-open-transactions-with-dbcc-opentran</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sun, 03 May 2020 10:00:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45duPYhLqmd6SJpk3GuW1oKUPYmCGgMhJtn3Q?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Violation of Primary Key (SQL Server)]]></title><description><![CDATA[Check out the solution in the video (ETL) Violation of PRIMARY KEY constraint 'PK_Constraint' - Different Source and Destination Keys. One pattern I've seen quite often is developers changing primary keys]]></description><link>http://direct.ecency.com/data/@sqlinsix/violation-of-primary-key-sql-server</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/violation-of-primary-key-sql-server</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sat, 02 May 2020 08:10:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eKuhasJTigcMutMGBHty1ht4wva4T1Q3GRU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Object Doesn't Exist Or You Lack Permissions In SQL Server (Naming)]]></title><description><![CDATA[Check out the solution in the video Cannot find the object sp_Name because it does not exist or you do not have permission (naming). While this error should rarely appear, it serves as a reminder to avoid]]></description><link>http://direct.ecency.com/data/@sqlinsix/object-doesn-t-exist-or-you-lack-permissions-in-sql-server-naming</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/object-doesn-t-exist-or-you-lack-permissions-in-sql-server-naming</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Thu, 30 Apr 2020 09:52:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e6gwbVuDNewHjKDCaVDWLcBcxMorjVd1UXG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Should We Use the NOLOCK Hint?]]></title><description><![CDATA[Check out the discussion in the video . A colleague once shared a story of a company that dismissed a developer because the developer had run a query counting records without using NOLOCK. The OLPT environment]]></description><link>http://direct.ecency.com/data/@sqlinsix/should-we-use-the-nolock-hint</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/should-we-use-the-nolock-hint</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Wed, 29 Apr 2020 08:32:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eN2Ruzqa32bdedEdkMtwJSJNHFRJaKP9AaA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Getting the Median In T-SQL and Why]]></title><description><![CDATA[We look at median overall and with T-SQL in What Is Median? Why Use Median?. As you can see, we see one way in which we can obtain the median using T-SQL. We also notice a comparison of average versus]]></description><link>http://direct.ecency.com/data/@sqlinsix/getting-the-median-in-t-sql-and-why</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/getting-the-median-in-t-sql-and-why</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Mon, 27 Apr 2020 09:30:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eKxBfgJQiBnC27yidDaRXpFWkDPoBaKpJsQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Quickly Obtain Log Space Used In SQL Server]]></title><description><![CDATA[Check out the solution in the video TSQL: Quickly Obtain Log Space Used (DBCC SQLPERF). Prevention beats cure, but this is a great command for those situations we haven't had time to look at and need to]]></description><link>http://direct.ecency.com/data/@sqlinsix/quickly-obtain-log-space-used-in-sql-server</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/quickly-obtain-log-space-used-in-sql-server</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sun, 26 Apr 2020 17:38:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eGHgEC6n79ebdxf1ewdS5kwWsbFtcczVa46?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Investigating the SOS_SCHEDULER_YIELD Wait Type]]></title><description><![CDATA[Check out the solution in the video Wait Types Part IX: SOS_SCHEDULER_YIELD. Before you dive into the system, make sure you understand the architecture, as we expect to see some wait types such as these]]></description><link>http://direct.ecency.com/data/@sqlinsix/investigating-the-sosscheduleryield-wait-type</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/investigating-the-sosscheduleryield-wait-type</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Fri, 24 Apr 2020 08:24:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45ePxjbXGK4RmF1YdK3LeC8AHUURNfHcguQHU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Getting Maximum Column Lengths In SQL Server]]></title><description><![CDATA[Check out the solution in the video TSQL: Get Maximum Length of Every Column On A Table. This can be helpful if we require strict limits in downstream tables, assuming that we have a data flow where we]]></description><link>http://direct.ecency.com/data/@sqlinsix/getting-maximum-column-lengths-in-sql-server</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/getting-maximum-column-lengths-in-sql-server</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Thu, 23 Apr 2020 08:16:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e3tfr47GZzQgHa8c594gt3T6NAGLHMLuVYa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Getting the Last Restore Date In SQL Server]]></title><description><![CDATA[Check out the solution in the video TSQL: Get Last Restore Date. I've faced situations where backups were failing, but we didn't have any warnings, so running this query and organizing the output by latest]]></description><link>http://direct.ecency.com/data/@sqlinsix/getting-the-last-restore-date-in-sql-server</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/getting-the-last-restore-date-in-sql-server</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Wed, 22 Apr 2020 09:08:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eKbaC5WincHHMNuK5aG3dtfQuPz1Y4RkVCa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Using Table Locks Hints]]></title><description><![CDATA[Check out the discussion about table lock hints in the video TSQL: TABLOCK vs. TABLOCKX (vs. Normal Process). We look at the actual results of using the different hints and consider whether we'd want to]]></description><link>http://direct.ecency.com/data/@sqlinsix/using-table-locks-hints</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/using-table-locks-hints</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Tue, 21 Apr 2020 08:25:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eKWpPuwkaQoZjiGq4TchPDj7pWzFy5Wkevi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Violation of PRIMARY KEY Constraint - When Source And Destination Keys Differ]]></title><description><![CDATA[Check out the solution in the video (ETL) Violation of PRIMARY KEY constraint 'PK_Constraint' - Different Source and Destination Keys. While it's rare to see, from time to time, I do see a design where]]></description><link>http://direct.ecency.com/data/@sqlinsix/violation-of-primary-key-constraint-when-source-and-destination-keys-differ</link><guid isPermaLink="true">http://direct.ecency.com/data/@sqlinsix/violation-of-primary-key-constraint-when-source-and-destination-keys-differ</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sun, 19 Apr 2020 10:01:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eKuhasJTigcMutMGBHty1ht4wva4T1Q3GRU?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>