Pop Rivett's SQL Server FAQ No.5: Pop on the Audit Trail
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
2007-01-09
2,668 reads
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
2007-01-09
2,668 reads
Among the most common tasks that have not yet been discussed in this series is the Send Mail task, which will be the topic of this article.
2007-01-08
2,394 reads
With a new name, new capabilities, and a new focus, the product formerly called SQL Server Mobile Edition expands its reach to small-footprint desktop applicationsand it's free!
2007-01-04
2,923 reads
It's nice to have little amenities in your development tools. They make for easier development and can save you a little time. Synonyms is one of those tools.
2007-01-03
3,795 reads
Security has become more and more important in today's business environment. From the database point of view, DBAs and system administrators need an improved security model. SQL Server 2005 provides an improved security feature. It is claimed that SQL Server 2005 is secure by default. In SQL Server 2005, the security model is divided into three areas namely authentication, authorization, and encryption.
2006-12-29
2,741 reads
As a DBA, you can find very useful information in the Windows event logs. About important events, the health of your SQL Server and the operating system it runs on. Unfortunately, the logs also contain a lot of useless information. Some applications have a tendency to log hundreds of events every day, filling up the logs very quickly with info that you, as a DBA, do not need. But you still need to see that important message that informs you the server is going to crash if you don’t take action.
2006-12-28
2,298 reads
Because many programs I wrote depends on the SQL Agent Service and to really make sure that no one has configured this service to run manually (you see many things in life) I rely on this litle piece of code
2006-12-27 (first published: 2004-09-16)
193 reads
Utilizing design patterns with SQL Server 2005 Service Broker enables you to assess and select appropriate solutions for all of your SQL Server 2005 asynchronous messaging needs.
2006-12-27
2,224 reads
Procedure to help find missing constraints when comparing two databases that are supposed to be the same. SP has ability to show all constraints per database, and the ability to generate create scripts to make adding the missing constraints easier.
2006-12-26 (first published: 2002-03-12)
784 reads
In this article we will set the chart control on a report and populate it. We will also cover the different charting display options and I'll demonstrate some rather cool formatting techniques.
2006-12-26
2,718 reads
By ChrisJenkins
You could be tolerating limited reporting because there isn’t an off the shelf solution...
A while back I wrote a quick post on setting up key mappings in...
By Steve Jones
In 100 years a lot of what we take to be true now will...
Hello, I inherited a number of tables with like 20-30 column using nvarchar(256) in...
Hi, i'm running vs2022. I'm trying out a c# script that i'd like to...
I upgraded a SQL Server 2019 instance to SQL Server 2025. I wanted to test the fuzzy string search functions. I run this code:
SELECT JARO_WINKLER_DISTANCE('tim', 'tom')
I get this error message:Msg 195, Level 15, State 10, Line 1 'JARO_WINKLER_DISTANCE' is not a recognized built-in function name.What is wrong? See possible answers