Using full-text search for symbols in SQL Server
Here's how to use full-text search in SQL Server when querying exact SQL expressions that include symbols. Use these steps to search symbols in SQL with these steps.
2008-08-27
3,524 reads
Here's how to use full-text search in SQL Server when querying exact SQL expressions that include symbols. Use these steps to search symbols in SQL with these steps.
2008-08-27
3,524 reads
Not everyone who had to use Management Studio when it first appeared in SQL Server 2005 liked it. The paint was still wet and there was still scaffolding around. To give Microsoft its credit, it has succeeded in transforming it into a much more useful product, in its SQL Server 2008 reincarnation.
2008-08-26
5,478 reads
Data modeling is based on the precept of knowing your data and knowing how the data is interrelated with other data. Everyone knows their data – right? If so, then why do we have so many problems building systems that do what the users want?
2008-08-26
3,073 reads
DBA's and web developers at our company are experiencing issues with connecting to SQL instances using SQL Server Management Studio and other SQL tools using Windows Integrated Authentication. Our company is large, with well over 70,000 users and groups in Active Directory. When we look in the NT event log on the SQL Server we see both MSSQL and Kerberos errors. What could be causing this?
2008-08-25
3,296 reads
It is an interesting problem in Transact SQL, for which there are a number of solutions and considerable debate. How do you go about producing a summary result in which a distinguishing column from each row in each particular category is listed in a 'aggregate' column? A simple, and intuitive way of displaying data is surprisingly difficult to achieve. Anith Sen gives a summary of different ways, and offers words of caution over the one you choose.
2008-08-22
4,249 reads
Lately it seems like SQL Injection attacks have been increasing. Recently our team has worked through resolving a few different SQL Injection attacks across a variety of web sites. Each of these attacks had a number of similarities which proved to point back to the same source. With this information in hand, the resolution should be much quicker. As such, if your web site is attacked with SQL Injection, how should you address it? How can the identification, analysis, recovery and resolution be streamlined? What are some lessons learned?
2008-08-22
4,820 reads
Join MSAS Architect Bill Pearson in hands-on exercises, where we gain exposure to the use of the MEMBER_UNIQUE_NAME property in generating simple lists, as well as datasets to support report parameter picklists.
2008-08-21
1,615 reads
A technical paper from the SQLCAT team on moving databases with service broker applications.
2008-08-21
2,146 reads
We are looking to automate some tasks to be performed on our SQL Server Analysis Services Servers. Can you give us the details on how the Analysis Services Execute DDL Task can be used in a SQL Server Integration Services (SSIS) package?
2008-08-20
3,459 reads
Some reasons for the slow-running of database applications aren't obvious. Occasionally, even the profiler won't tell you enough to remedy a problem, especially when a SQL Statement is being forced to wait. Now, in SQL Server 2008, come XEvents, which allow you to look at those waits that are slowing your SQL Statements. Mario Broodbakker continues his series about SQL Server Wait Events
2008-08-20
2,056 reads
By Vinay Thakur
it has been a year since i have not written much on the blog...
By Steve Jones
on tenderhooks – adj. feeling the primal satisfaction of being needed by someone, which...
By DataOnWheels
I have been active in the data community throughout my career. I have met...
Comments posted to this topic are about the item A Quick Restore
Comments posted to this topic are about the item Guarding Against SQL Injection at...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
While doing some testing of an application, I wanted to reset my environment after doing some testing with this code:
USE DNRTest BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO /* Bunch of stuff tested here */RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens if this runs, assuming the "bunch of stuff" isn't anything affecting the instance. See possible answers