SQL Server organizes the transaction log as reusable virtual log files. However, there are eight reasons that can prevent their reuse causing the log file to grow. Find out what those reasons are and what to do about it.
Did you ever have to fix something in an encrypted stored procedure but did not have access to the original anymore? This article shows how to decrypt encrypted SQL Server object using a simple method called Known Plaintext Attack.
Which logical join types can be conquered by the Hash Join algorithm? Are there any special cases I need to be aware of for which the Hash Join operator might not be the best fit? Read on to get the answers.
The Merge Join algorithm is the fastest in many cases. But how do I know what is possible and more importantly when it is not a good choice at all to use the Merge Join operator in an execution plan?
Which logical join types can be handled by the Loop Join operator and which can’t? Where does the optimizer have to jump through hoops to generate a query plan? This article gives answers to these questions.