Identity hijacking on Twitter.
The other day, I got an email from Twitter announcing that someone new is following me.
The other day, I got an email from Twitter announcing that someone new is following me.
We have guidelines for the naming conventions of our database objects. It’s pretty much the common pattern you see all over the place. For example, we use t...
A while back, I had blogged about a tip that Mark Wagner had posted about converting a string to an enumerated value. Tim Sneath posted a similar tip even e...
Xinwei Hong (MSFT) wrote a great troubleshooting guide on how to identify and resolve SQL Server connectivity issues on the SQL Protocols blog.
I just installed the PowerCommands 1.1 for Visual Studio 2008. This is a set of extensions to the VS 2008 IDE that provide some additional functionality. T...