Fixing Your Identity
If you use identity values, chances are that at some point you will need to find more information about the next value or reset the seed. This article looks at how you can accomplish this.
2001-12-31
7,122 reads
If you use identity values, chances are that at some point you will need to find more information about the next value or reset the seed. This article looks at how you can accomplish this.
2001-12-31
7,122 reads
This document (divided in chapters for your convenience) describes how to design a secure, scalable, highly available, and manageable Internet data center that is based on Microsoft products. This documentation examines the major challenges to consider when designing an Internet data center architecture and how this design addresses these challenges.
2001-12-30
967 reads
This webcast is scheduled for Tuesday, January 15, 2002 at 10:00 AM Pacific time.During this session, we will show a practical approach to analyze performance tuning problems that involve Microsoft SQL Server lock monitoring data. We will briefly discuss sp_who2, sysprocesses, and syslocks.
2001-12-28
1,218 reads
Should you use this book to prepare for the 70-100 exam? Read the review and find out!
2001-12-26
3,710 reads
The major part of the article, however, is dedicated to a topic that often confuses people and leads to some of the strongest disagreements among IT professionals and developers: the benefits and drawbacks of enforcing security in the middle (or business) tier versus the data tier.
2001-12-25
1,855 reads
Happy Holidays database administrators! As a parting present before you go home for your year-end break, Microsoft has announced a security problem in SQL Server 7.0 and 2000.
2001-12-24
6,555 reads
Please join Jim Gray, Distinguished Engineer at Microsoft Research, for this Q&A Session. Jim, the father of Structured Query Language, has been looking at LARGE databases like Google, Hotmail, BarBar, CERN, EOS/DIS, Internet Archive, and others that are either at a Petabyte or will grow to a petabyte scale in the next year or so.
2001-12-21
3,118 reads
There are times when we need to know that rows of data that meet specific criteria exist in a table. There are 2 basic ways to find this information: COUNT() and EXISTS(). Here are some examples.
2001-12-20
4,951 reads
See how to configure and troubleshoot an HTTP connection to Analysis Services over both the Internet and an intranet. We will show you how to configure Microsoft Internet Information Services (IIS), and discuss the different security options for IIS in regard to Analysis Services.
2001-12-20
3,182 reads
Alxander Chigrik presents some useful User Defined Functions you can add to your SQL Server.
2001-12-19
8,617 reads
Parameter Sensitive Plan (PSP) optimization is a new feature in SQL Server 2022 that...
By Arun Sirpal
Chaos engineering is fun but especially important when building solutions in the cloud. It...
By DataOnWheels
I am proud to announce the launch of a new book, centered around the...
Hi there, I'm on a team developing an enterprise data warehouse for our organization....
Comments posted to this topic are about the item PostgreSQL Copy
Comments posted to this topic are about the item Secure Enclave Attestation