CLR: Reflections on Reflection
Do you wish callers of your library could describe their types to you programmatically? Read a little about reflection in CLR Programming.
2007-07-20
2,249 reads
Do you wish callers of your library could describe their types to you programmatically? Read a little about reflection in CLR Programming.
2007-07-20
2,249 reads
This article describes how to provide full text search using Microsoft Indexing Service in .NET applications.
2007-07-20
2,379 reads
SQL Server Integration Services (SSIS) includes two very interesting transforms, the Fuzzy Grouping and Fuzzy Lookup transformations. Brian Norberg discussed the former in another article and this time examines the Fuzzy Lookup Transformation.
2007-07-19
10,265 reads
SSIS introduced a feature called "Package Configurations". Package configurations allow us to make SSIS packages portable and help us change SQL Server and file connectivity information dynamically.
2007-07-19
2,738 reads
Concurrency and transaction isolation are a prickly subject, difficult to explain with any kind of clarity without boring the reader and leaving their poor brain in a complete muddle. Therefore, it is often ignored in the vain hope it won't affect us and we can forget all about it. Well you can't ignore it any more and with SQL Server 2005 there's a whole new isolation level added to the four that already exist.
2007-07-19
2,385 reads
2007-07-18
2,936 reads
You are asked for the sa password for a SQL Server in order to perform a software upgrade. You, the DBA, don't know the password and it's not documented. Rodney Landrum provides a way out of this dilemma, demonstrating two techniques for temporarily changing the password, and then returning it to its previous unknown value.
2007-07-18
4,312 reads
Many state data-breach laws exempt encrypted data from PR-nightmare public-notice requirements, but don't let that fool you into thinking it's an easy answer to the data privacy challenge. Here's the lowdown on loopholes, caveats and options to consider when applying encryption.
2007-07-17
2,316 reads
In this article, I'll show you how to create a generic scheduler that runs on a Windows Service. The scheduler will be able to accept pluggable actions that we can develop later implementing a custom interface.
Background
2007-07-17
3,240 reads
SQL Server 2005 has greatly increased the capabilities of the platform and brought the capabilities for complex ETL packages to many businesses at an affordable cost. One of the very interesting transformations you can use in SSIS is the fuzzy grouping task and new author Brian Nordberg brings us a look at how you can use this.
2007-07-16
8,415 reads
Every organization I talk to has the same problem dressed up in different clothes....
By DataOnWheels
I am delighted to host this month’s T-SQL Tuesday invitation. If you are new...
By alevyinroc
Ten years (and a couple jobs) ago, I wrote about naming default constraints to...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item Using OPENJSON
Comments posted to this topic are about the item Data Modeling with dbt for...
I have some data in a table that looks like this:
BeerID BeerName brewer beerdescription 1 Becks Interbrew Beck's is a German-style pilsner beer 2 Fat Tire New Belgium Toasty malt, gentle sweetness, flash of fresh hop bitterness. 3 Mac n Jacks Mac & Jack's Brewery This beer erupts with a floral, hoppy taste 4 Alaskan Amber Alaskan Brewing Alaskan Brewing Amber Ale is an "alt" style beer 8 Kirin Kirin Brewing Kirin Ichiban is a Lager-type beerIf I run this, what is returned?
select t1.key
from openjson((select t.* FROM Beer AS t for json path)) t1 See possible answers