TechEd: 80 minute video of Corruption Survival Techniques presentation
A great presentation from Paul Randal of SQL Skills from TechEd 2008. Definitely worth the time to watch.
2008-12-08
5,046 reads
A great presentation from Paul Randal of SQL Skills from TechEd 2008. Definitely worth the time to watch.
2008-12-08
5,046 reads
I can run the Database Tuning Advisor or examine the query plans, but is there any easier way to determine which indexes may be needed?
2008-12-08
2,297 reads
Discover, through a hands-on practice exercise, a more sophisticated business use for the MDX BottomCount() function, in combination with the Generate(), Descendants(), Ancestor() and other functions we have explored within our series. Join BI Architect Bill Pearson in this, the second part, of an extended examination of the MDX BottomCount() function.
2008-12-05
1,889 reads
With the combination of a few T-SQL commands this tip shows you a simple way to export data to text files.
2008-12-05
9,878 reads
I am running an application that issues queries directly to the database from within its source code. I've noticed that the database server will get low on available memory and that CPU activity is higher than I'd like. What could be the problem?
2008-12-04
4,574 reads
This 490-page document covers the essential phases and steps to upgrade existing instances of SQL Server 2000 and 2005 to SQL Server 2008 by using best practices. These include preparation tasks, upgrade tasks, and post-upgrade tasks. It is intended to be a supplement to SQL Server 2008 Books Online.
2008-12-03
3,401 reads
In this workbench, Robyn Page and Phil Factor decide to tackle the subject of Matrix handling and Matrix Mathematics in SQL. They maintain that 'One just needs a clear head and think in terms of set-based operations'
2008-12-03
3,109 reads
One of the things you need to aware of is that if you create a logon trigger and there is some bad code you are going to prevent everyone from logging into your SQL Server, even if you try as "sa" or a member of the sysadmin fixed server role. How do I log on to my SQL Server to fix this trigger?
2008-12-02
3,887 reads
In the recent installments of our "SQL Server 2005 Express Edition" series we have been discussing mechanisms that facilitate authentication of distributed systems participating in Service Broker conversations. This article discusses use of digital certificates in encrypting their content on the transport level.
2008-12-01
2,512 reads
Given the fundamental importance of indexes in databases, it always comes as a surprise how often the proper design of indexes is neglected. It often turns out that the programmer understands detail, but not the broad picture of what indexes do. Bob Sheldon comes to the rescue with a simple guide that serves either to remind or educate us all!
2008-12-01
6,724 reads
By Brian Kelley
My most recent bout with imposter syndrome was with ISACA’s Digital Trust Ecosystem Framework...
By Steve Jones
“On the way to a grand goal, celebrate the smallest victories as if each...
Materialized lake views (MLVs) in Microsoft Fabric are an effective way to implement medallion...
Whatsapp:08218171955 Jl. Muara Karang Timur, Blok B VIII No.116-117, Daerah Khusus Ibukota Jakarta 14450
Whatsapp:08216977726 Jl. Pd. Timur Indah Kompleks Perumahan Taman Nirwana No.8, RT.005/RW.019, Pengasinan, Kec. Rawalumbu,...
Ruko Citra Niaga, Perum. Citra Garden II Blok B No. 1 & 2, Pegadungan,...
How can I alter the deadlock detection interval to 2 seconds instead of 5 seconds on my SQL Server 2025 instance?
See possible answers