Visit the SQLounge at PASS 2005!
Tried at TechEd and manned by the SQLServerCentral.com crew, this was a great idea. It's going to be at PASS and hosted by James Luetkehoelter.
2005-09-21
2,928 reads
Tried at TechEd and manned by the SQLServerCentral.com crew, this was a great idea. It's going to be at PASS and hosted by James Luetkehoelter.
2005-09-21
2,928 reads
Query Analyzer has been a great tool in SQL Server 2000 and while it is superceeded in SQL Server 2005, lots of us will be using it for some time to come. New author Yakov Shlafman brings us some references and tricks for this essential DBA tool.
2005-09-20
9,083 reads
It is just next week that the PASS 2005 Summit kicks off and we've got some information about our casino party for those attending.
2005-09-20
3,554 reads
There has been a lot of interest in the web-facing community lately about a new useability feature that goes by a number of different names—XMLHTTP, AJAX, out-of-band requests, and asynchronous client script callbacks, to name a few.
Regardless of the name, this feature provides a way for a standard web page to make calls back to the server, without a traditional page refresh. The user is oblivious to the fact that a server call has occurred, and is not interrupted by it.
2005-09-20
2,167 reads
In a followup to the recent articles and discussions on interviewing and DBA skills, Sean McCown brings us a new article that looks at one situation that resulted in a rejection. Learn what you might want to work on before your next interview.
2005-09-19
12,121 reads
n this lesson, we will examine another function / property in the MDX toolset, the .UniqueName function. The general purpose of the .UniqueName function is to return the Unique Name of the object to which it is appended. .UniqueName can be used in conjunction with hierarchies, dimensions, levels, and members, in a manner similar to the .Name function that we examined in String Functions: The .Name Function, and, also like .Name, .UniqueName can be useful in a host of different applications.
2005-09-19
1,744 reads
In order for a transaction to meet the requirements of ACID, locks are employed to insure data integrity and multi-user access. The scope, or number of rows held by a lock, is referred to as Lock Granularity. This month, we will begin by introducing several different types of lock modes employed by MS SQL.
2005-09-16
3,544 reads
Less than two weeks away, sessions tried and tested at the PDC, the Microsoft SQL Server development team and gambling with SQLServerCentral.com! Register today!
2005-09-15
2,940 reads
Continuing on an interview with Raj Gill, SQL Server 2005 Roadshow Presenter by Robert Pearl. Get inside the mind of the co-founder of Scalability Experts.
2005-09-15
16,921 reads
Confidential until the official release at 9:00am Pacific Time today. Check back after that time to get the big news!
2005-09-14
18,978 reads
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
By Steve Jones
etherness – n. the wistful feeling of looking around a gathering of loved ones,...
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
Comments posted to this topic are about the item The Microsoft SQL Year in...
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
Comments posted to this topic are about the item Your Value from a Conference
What does this code return in SQL Server 2025+? (assume the database has an appropriate collation)
SELECT UNISTR('Hello 4E16754C') AS 'A Classic';
A:
B:
See possible answers