Discover SQL Server TCP Port
Learn how to discover the TCP port for a SQL Server instance from the registry using Windows Powershell.
2008-08-27
4,303 reads
Learn how to discover the TCP port for a SQL Server instance from the registry using Windows Powershell.
2008-08-27
4,303 reads
Here's how to use full-text search in SQL Server when querying exact SQL expressions that include symbols. Use these steps to search symbols in SQL with these steps.
2008-08-27
3,524 reads
Not everyone who had to use Management Studio when it first appeared in SQL Server 2005 liked it. The paint was still wet and there was still scaffolding around. To give Microsoft its credit, it has succeeded in transforming it into a much more useful product, in its SQL Server 2008 reincarnation.
2008-08-26
5,478 reads
Data modeling is based on the precept of knowing your data and knowing how the data is interrelated with other data. Everyone knows their data – right? If so, then why do we have so many problems building systems that do what the users want?
2008-08-26
3,073 reads
DBA's and web developers at our company are experiencing issues with connecting to SQL instances using SQL Server Management Studio and other SQL tools using Windows Integrated Authentication. Our company is large, with well over 70,000 users and groups in Active Directory. When we look in the NT event log on the SQL Server we see both MSSQL and Kerberos errors. What could be causing this?
2008-08-25
3,296 reads
It is an interesting problem in Transact SQL, for which there are a number of solutions and considerable debate. How do you go about producing a summary result in which a distinguishing column from each row in each particular category is listed in a 'aggregate' column? A simple, and intuitive way of displaying data is surprisingly difficult to achieve. Anith Sen gives a summary of different ways, and offers words of caution over the one you choose.
2008-08-22
4,249 reads
Lately it seems like SQL Injection attacks have been increasing. Recently our team has worked through resolving a few different SQL Injection attacks across a variety of web sites. Each of these attacks had a number of similarities which proved to point back to the same source. With this information in hand, the resolution should be much quicker. As such, if your web site is attacked with SQL Injection, how should you address it? How can the identification, analysis, recovery and resolution be streamlined? What are some lessons learned?
2008-08-22
4,820 reads
Join MSAS Architect Bill Pearson in hands-on exercises, where we gain exposure to the use of the MEMBER_UNIQUE_NAME property in generating simple lists, as well as datasets to support report parameter picklists.
2008-08-21
1,615 reads
A technical paper from the SQLCAT team on moving databases with service broker applications.
2008-08-21
2,146 reads
We are looking to automate some tasks to be performed on our SQL Server Analysis Services Servers. Can you give us the details on how the Analysis Services Execute DDL Task can be used in a SQL Server Integration Services (SSIS) package?
2008-08-20
3,459 reads
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
By Brian Kelley
Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...
Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
Comments posted to this topic are about the item Your Value from a Conference
Comments posted to this topic are about the item UNISTR Basics
What does this code return in SQL Server 2025+? (assume the database has an appropriate collation)
SELECT UNISTR('Hello 4E16754C') AS 'A Classic';
A:
B:
See possible answers