2009-05-25
1,504 reads
2009-05-25
1,504 reads
I just finished up my third coaching call with Don Gabor (Part 1, Part 2, Part 3, Part 4) and I think I'm gaining a little ground, but still finding that I have a lot to learn.
2009-05-25
813 reads
This video looks at the memory buffers that transfer data to the data flow of an Integration Services package.
2009-05-25
1,040 reads
Scalable, cost-effective EDW implementation is an elusive goal for many large organizations. Three common approaches include centralized EDW the “monolithic” approach, decentralized collections of data marts, and attempts at hub-and-spoke architectures that combine the previous two. With the acquisition of DATAllegro and the pending release of Project codename “Madison,” Microsoft is poised to deliver a unique and compelling Massively Parallel Processing (MPP) data warehouse solution that combines the best features of both EDW and decentralized data marts.
2009-05-25
1,312 reads
In a sequel to his previous article on referential integrity, Glen Cooper looks at some ways to analyze who is getting emails based on a database system.
2009-05-22
4,242 reads
Many shops do full backups of their databases as part of a job within SQL Agent, typically as part of a maintenance plan. This job will often times do all database backups in secession. As such, while you may know how long the job takes, you may not know how long any one particular database takes to have a full backup taken.
2009-05-22
3,711 reads
SQL Server 2005 introduces a rich set of tools supporting the development and management of Business Intelligence applications. This includes applications using Analysis Services (OLAP and Data Mining), as well as Reporting Services and Data Transformation Services (DTS).
2009-05-22
2,254 reads
I saw this mentioned on Twitter, and watched it while doing some light editing and scheduling. It’s from TechEd 2009 in LA, and includes a number of MVPs and consultants and even a Microsoft SQL Server program manager. It’s a video, running about 55 minutes...
2009-05-22
5,658 reads
In part 2 of his series, Lee Everest expands upon bitmasking and integrates this with the SQL CLR.
2009-05-21
22,154 reads
The sixth and last module of the training course "Becoming a Profiler Master", describes how to create custom Profiler traces, tailored to the specific performance problem you wish to investigate.
2009-05-21
9,163 reads
By Vinay Thakur
This week has training on AI – Cyber security experts – Omar Santos and...
Following on from my previous post on building The Burrito Bot, I want to...
By HeyMo0sh
DevOps is about shortening the system development lifecycle. Plan faster, build faster, test faster,...
Comments posted to this topic are about the item PostgreSQL String Functions Part 1
Comments posted to this topic are about the item Working Better Under Pressure
Comments posted to this topic are about the item Identities and Sequences V
When thinking about the identity property and sequence objects, which of these can generate values before an insert statement is executed?
See possible answers