How to use Common Table Expression (CTE) in SQL Server to break down problems into multiple steps

Home > Videos > SQL Server > How to use Common Table Expression (CTE) in SQL Server to break down problems into multiple steps

How to use Common Table Expression (CTE) in SQL Server to break down problems into multiple steps

Like This Video 0 184 Peter Avila
Added by March 18, 2019

In this SQL Server training video, instructor Peter Avila demonstrates how to utilize common table expressions (CTEs) to progressively convert one data structure to another. Using a real world example, Peter introduces a common problem in which the structure of the desired output and the structure of the data in the database are so different that the output cannot be obtained by a single transformation of the data from the database. Using a chain of CTEs, Peter shows how to break down the problem into smaller transformations and perform them step by step to obtain the desired structure in the output.

 

Videos You May Like

Agile Methodology in Project Management

0 153 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

JavaScript for C# Developers – September 24, 2014

0 487 3

Is JavaScript worth taking the time to learn if I’m a server-side .NET developer? How much of C# carries over to JavaScript? In this recorded video from Dan Wahlin’s webinar on September 24,2014, Dan answers these questions and more while also discussing similarities between the languages, key differences, and the future of JavaScript (ES6). If … Continue reading JavaScript for C# Developers – September 24, 2014

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.