Discover SQL Server TCP Port
Learn how to discover the TCP port for a SQL Server instance from the registry using Windows Powershell.
2008-08-27
4,303 reads
Learn how to discover the TCP port for a SQL Server instance from the registry using Windows Powershell.
2008-08-27
4,303 reads
Here's how to use full-text search in SQL Server when querying exact SQL expressions that include symbols. Use these steps to search symbols in SQL with these steps.
2008-08-27
3,524 reads
Not everyone who had to use Management Studio when it first appeared in SQL Server 2005 liked it. The paint was still wet and there was still scaffolding around. To give Microsoft its credit, it has succeeded in transforming it into a much more useful product, in its SQL Server 2008 reincarnation.
2008-08-26
5,478 reads
Data modeling is based on the precept of knowing your data and knowing how the data is interrelated with other data. Everyone knows their data – right? If so, then why do we have so many problems building systems that do what the users want?
2008-08-26
3,073 reads
DBA's and web developers at our company are experiencing issues with connecting to SQL instances using SQL Server Management Studio and other SQL tools using Windows Integrated Authentication. Our company is large, with well over 70,000 users and groups in Active Directory. When we look in the NT event log on the SQL Server we see both MSSQL and Kerberos errors. What could be causing this?
2008-08-25
3,296 reads
It is an interesting problem in Transact SQL, for which there are a number of solutions and considerable debate. How do you go about producing a summary result in which a distinguishing column from each row in each particular category is listed in a 'aggregate' column? A simple, and intuitive way of displaying data is surprisingly difficult to achieve. Anith Sen gives a summary of different ways, and offers words of caution over the one you choose.
2008-08-22
4,249 reads
Lately it seems like SQL Injection attacks have been increasing. Recently our team has worked through resolving a few different SQL Injection attacks across a variety of web sites. Each of these attacks had a number of similarities which proved to point back to the same source. With this information in hand, the resolution should be much quicker. As such, if your web site is attacked with SQL Injection, how should you address it? How can the identification, analysis, recovery and resolution be streamlined? What are some lessons learned?
2008-08-22
4,820 reads
Join MSAS Architect Bill Pearson in hands-on exercises, where we gain exposure to the use of the MEMBER_UNIQUE_NAME property in generating simple lists, as well as datasets to support report parameter picklists.
2008-08-21
1,615 reads
A technical paper from the SQLCAT team on moving databases with service broker applications.
2008-08-21
2,146 reads
We are looking to automate some tasks to be performed on our SQL Server Analysis Services Servers. Can you give us the details on how the Analysis Services Execute DDL Task can be used in a SQL Server Integration Services (SSIS) package?
2008-08-20
3,459 reads
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
Comments posted to this topic are about the item An SSIS Upgrade
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers