Pop Rivett's SQL Server FAQ No.5: Pop on the Audit Trail
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
2007-01-09
2,668 reads
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
2007-01-09
2,668 reads
Among the most common tasks that have not yet been discussed in this series is the Send Mail task, which will be the topic of this article.
2007-01-08
2,394 reads
With a new name, new capabilities, and a new focus, the product formerly called SQL Server Mobile Edition expands its reach to small-footprint desktop applicationsand it's free!
2007-01-04
2,923 reads
It's nice to have little amenities in your development tools. They make for easier development and can save you a little time. Synonyms is one of those tools.
2007-01-03
3,795 reads
Security has become more and more important in today's business environment. From the database point of view, DBAs and system administrators need an improved security model. SQL Server 2005 provides an improved security feature. It is claimed that SQL Server 2005 is secure by default. In SQL Server 2005, the security model is divided into three areas namely authentication, authorization, and encryption.
2006-12-29
2,741 reads
As a DBA, you can find very useful information in the Windows event logs. About important events, the health of your SQL Server and the operating system it runs on. Unfortunately, the logs also contain a lot of useless information. Some applications have a tendency to log hundreds of events every day, filling up the logs very quickly with info that you, as a DBA, do not need. But you still need to see that important message that informs you the server is going to crash if you don’t take action.
2006-12-28
2,298 reads
Because many programs I wrote depends on the SQL Agent Service and to really make sure that no one has configured this service to run manually (you see many things in life) I rely on this litle piece of code
2006-12-27 (first published: 2004-09-16)
193 reads
Utilizing design patterns with SQL Server 2005 Service Broker enables you to assess and select appropriate solutions for all of your SQL Server 2005 asynchronous messaging needs.
2006-12-27
2,224 reads
Procedure to help find missing constraints when comparing two databases that are supposed to be the same. SP has ability to show all constraints per database, and the ability to generate create scripts to make adding the missing constraints easier.
2006-12-26 (first published: 2002-03-12)
785 reads
In this article we will set the chart control on a report and populate it. We will also cover the different charting display options and I'll demonstrate some rather cool formatting techniques.
2006-12-26
2,718 reads
By HeyMo0sh
As a DevOps person, I know that to make FinOps successful, you need more...
By HeyMo0sh
As someone who works in DevOps, I’m always focused on creating systems that are...
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
Comments posted to this topic are about the item Restoring On Top II
Comments posted to this topic are about the item SQL Art 2: St Patrick’s...
Comments posted to this topic are about the item Breaking Down Your Work
I have a database, DNRTest, that has a number of tables and other objects in it. The other day, I was trying to mock up a test and ran this code on the same server:
-- run yesterday CREATE DATABASE DNRTest2 GO USE DNRTest2 GO CREATE TABLE NewTable (id INT) GOToday, I realize that I need a copy of DNRTest for another mockup, and I run this:
-- run today USE Master BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO RESTORE DATABASE DNRTest2 FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens? See possible answers