Microsoft Windows PowerShell and SQL Server 2005 SMO – Part 9
Learn how to use PowerShell in conjunction with SMO to Generate an SQL Server Script.
2007-10-26
2,873 reads
Learn how to use PowerShell in conjunction with SMO to Generate an SQL Server Script.
2007-10-26
2,873 reads
SQL programming guru Joe Celko offers a classification scheme and advice on using the right keys.
2007-10-25
3,595 reads
Part 8 of our series provides an overview of User Instance model (also known as “Run As Normal User” or simply RANU) and automatic database connectivity, which serve as two primary enablers for XCopy deployment, facilitating distribution of single-user databases.
2007-10-25
1,766 reads
What is the best way to return the "duration" of an event in SQL, given the start and end datetime values? How can we add up these durations to return grand totals? What data types should be used to return this data to our clients? How do we handle overflows, such as when hours go over 23 or minutes total up to over 59? Are there any T-SQL functions or other techniques that are useful in these scenarios?
2007-10-24
4,455 reads
From one of the SQL Server 2005 storage engine lead developers comes this look at the impact of using the NO_LOG and TRUNCATE_ONLY options.
2007-10-24
3,313 reads
This installment illustrates how to use PowerShell in conjunction with SMO to display object properties of all SQL Server Objects.
2007-10-23
2,594 reads
When designing your SQL Server 2005 Analysis Services (SSAS) dimensions and related attributes—appropriately called attribute relationships—you should consider how changes in your dimension data will affect the underlying dimension aggregations and, in turn, processing and query performance.
2007-10-22
951 reads
Connecting to SQL Server 2000 Analysis Services could lie in the memory settings. Get possible problems and solutions to connect to Analysis Services server.
2007-10-22
2,033 reads
The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. It is expected to become the accepted means of encrypting digital information, including financial, telecommunications, and government data. This article presents an overview of AES and explains the algorithms it uses. Included is a complete C# implementation and examples of encrypting .NET data. After reading this article you will be able to encrypt data using AES, test AES-based software, and use AES encryption in your systems.
2007-10-19
2,427 reads
This installment of the series illustrates how to use PowerShell in conjunction with SMO to display SQL Server Objects.
2007-10-19
2,740 reads
Next Monday, March 9, 2026, my one-day live online training SQL Server 2025 Unleashed:...
By HeyMo0sh
As someone who’s worked with data for over 20 years and with many cloud...
By HeyMo0sh
2025 belongs to the AI startups. If you peek into the tech headlines, you’ll...
Comments posted to this topic are about the item A Quick Restore
Comments posted to this topic are about the item Guarding Against SQL Injection at...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
While doing some testing of an application, I wanted to reset my environment after doing some testing with this code:
USE DNRTest BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO /* Bunch of stuff tested here */RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens if this runs, assuming the "bunch of stuff" isn't anything affecting the instance. See possible answers