SSIS: Using stored procedures inside an OLE DB Source component
This short blog post looks at how you can use a stored procedure as a data source.
2006-12-22
2,284 reads
This short blog post looks at how you can use a stored procedure as a data source.
2006-12-22
2,284 reads
When designing and creating a data model for a data-driven application, the records in tables must each be uniquely identifiable. By having a unique value associated with each record, individual records can be selected, updated, or deleted. Being able to uniquely identify records is so important and standard in a database system that databases allow those designing a database table to specify what column (or columns) make up the primary key.
2006-12-22
3,518 reads
Reports on all indexes on user tables within a databaseReports Tables with Missing Clustered indexReports Tables with Missing Primary KeysReports Possible Redundant Index keysReports Possible Reverse Index key
2006-12-21 (first published: 2004-09-16)
483 reads
All good detective stories have a femme fatale. In the case of corporate espionage scandals, Celia Goodson, a seasoned businesswoman and once a glossily groomed blonde, has been involved in investigating more business transgressions to hit the City in the last three decades than anyone else of her years.
2006-12-21
2,627 reads
You can leverage SQL Server 2005 Service Broker with existing technologies such as SQL Server 2000 and MSMQ. BizTalk and SSB external activation are viable options, but a simple polling solution is easier.
2006-12-20
2,465 reads
We'll go over some examples of attacks against protocols and rules following, which will help you when designing and implementing protocols of your own.
2006-12-19
1,808 reads
2006-12-18
1,665 reads
This article is meant to explore these architectural issues from the bottom up, and aims to guide you through this new world. In the long run, new programming models are likely to appear that will abstract away a lot of the challenges you will encounter.
2006-12-15
2,929 reads
In this article I will discuss some new ideas that can result in either modifying SQL statements or injecting SQL code even if the code has escaped the delimiting characters. I will start with some best practices for constructing delimited identifiers and SQL literals, and then I'll show you new ways attackers can inject SQL code in order to help you protect your applications.
2006-12-14
4,373 reads
Check out SSIS, the SQL Server 2005 replacement for the older Data Transformation Services. You might find SSIS to be a great solution for automating SQL Server.
2006-12-13
2,992 reads
By Ed Elliott
SQL Server Management Studio (SSMS) has recently added support for Github Copilot. This is...
By Steve Jones
If it fails where you thought it would fail that is not a failure....
Quite a long title for a short blog post ??While deploying a DACPAC (from...
Telegram..@Euchemstore1 Telegram..@Euchemstore1 Email..euchemstore@gmail.com Email..euchemstore@gmail.com DMT (N,N-dimethyltryptamine) is a powerful hallucinogenic compound found naturally in...
Telegram..@Euchemstore1 Telegram..@Euchemstore1 Email..euchemstore@gmail.com Email..euchemstore@gmail.com DMT (N,N-dimethyltryptamine) is a powerful hallucinogenic compound found naturally in...
Telegram..@Euchemstore1 Telegram..@Euchemstore1 Email..euchemstore@gmail.com Email..euchemstore@gmail.com DMT (N,N-dimethyltryptamine) is a powerful hallucinogenic compound found naturally in...
What is returned when this code is run?
SELECT ORIGINAL_DB_NAME()See possible answers