Blog: How to Script a Profiler Trace as a SQL Trace Data Collection Set
MVP Brad McGehee shows how you can use Trace data as a source for your data collections for the new Management Data Warehouse
2008-10-01
2,900 reads
MVP Brad McGehee shows how you can use Trace data as a source for your data collections for the new Management Data Warehouse
2008-10-01
2,900 reads
I am trying to build an SSIS package where the entire package is encapsulated in a transaction. In addition there is a table that needs to remain locked for the duration of the SSIS package execution. Can you provide an example of how to do this?
2008-10-01
4,495 reads
Although current databases limit XML processing to linear XPath or XQuery queries, existing hierarchical database techniques enable far more complex queries using standard SQL.
2008-10-01
3,542 reads
This article describes how Database Administrators can manage SQL Server workload and critical system resource consumption using Resource Governor in SQL Server 2008
2008-09-30
2,126 reads
This is the final article of a three part series on Auditing in SQL Server 2008. This article shows how to setup a Database Audit Specification.
2008-09-30
2,246 reads
One of the ongoing challenges of a DBA is to backup and restore databases. Backups are done on an automated schedule, but restores can take on many different versions, you may need to restore a production database, restore a development or test database or just create another copy of the database somewhere else. There are several ways of automating the restore process and creating a script, but this approach shows a way this can be done by just reading the contents of a directory for the backup files that exist.
2008-09-29
4,985 reads
This article describes how the Object Catalog Views can be used to determine the number of rows in a table
2008-09-29
3,623 reads
This white paper presents an overview of cryptographic functionality and discusses how this applies to authentication, signed procedures, permissions, and encryption. Because the target audience is the database professional and not necessarily security experts, the focus is on practical ways to use cryptography in SQL Server.
2008-09-26
3,859 reads
Inspired by what he recently found in some SQL Server shops, database architect Brian Walker shares advice for improved database design – and SQL Server performance.
2008-09-26
5,999 reads
This fifth installment of the “Check your SQL Server using Windows PowerShell” series illustrates how to access SQL Server instance properties and SQL Server configuration details using Windows PowerShell.
2008-09-25
2,762 reads
By Steve Jones
I’m not sure I knew identity column values could not be updated. I ran...
By Steve Jones
We had an interesting discussion about deployments in databases and how you go forward...
By ChrisJenkins
You could be tolerating limited reporting because there isn’t an off the shelf solution...
I have mentioned this several times over several years. Can someone please help me...
SELECT COUNT(DISTINCT Component) AS Found FROM tblComponents WHERE(Component NOT LIKE '%[a-z]%') AND(LTRIM(RTRIM(Component)) = 'GM13622')...
Comments posted to this topic are about the item Remotely Engineer Fabric Lakehouse objects:...
In a SQL Server 2025 table, called Beer, I have this data:
BeerIDBeerName 1Becks 2Fat Tire 3Mac n Jacks 4Alaskan Amber 8KirinI run this code:
SELECT JSON_OBJECTAGG(
BeerID: BeerName )
FROM beer;
What are the results? See possible answers