2006-12-25
2,934 reads
2006-12-25
2,934 reads
This short blog post looks at how you can use a stored procedure as a data source.
2006-12-22
2,284 reads
When designing and creating a data model for a data-driven application, the records in tables must each be uniquely identifiable. By having a unique value associated with each record, individual records can be selected, updated, or deleted. Being able to uniquely identify records is so important and standard in a database system that databases allow those designing a database table to specify what column (or columns) make up the primary key.
2006-12-22
3,518 reads
Reports on all indexes on user tables within a databaseReports Tables with Missing Clustered indexReports Tables with Missing Primary KeysReports Possible Redundant Index keysReports Possible Reverse Index key
2006-12-21 (first published: 2004-09-16)
484 reads
All good detective stories have a femme fatale. In the case of corporate espionage scandals, Celia Goodson, a seasoned businesswoman and once a glossily groomed blonde, has been involved in investigating more business transgressions to hit the City in the last three decades than anyone else of her years.
2006-12-21
2,627 reads
You can leverage SQL Server 2005 Service Broker with existing technologies such as SQL Server 2000 and MSMQ. BizTalk and SSB external activation are viable options, but a simple polling solution is easier.
2006-12-20
2,465 reads
We'll go over some examples of attacks against protocols and rules following, which will help you when designing and implementing protocols of your own.
2006-12-19
1,808 reads
2006-12-18
1,665 reads
This article is meant to explore these architectural issues from the bottom up, and aims to guide you through this new world. In the long run, new programming models are likely to appear that will abstract away a lot of the challenges you will encounter.
2006-12-15
2,929 reads
In this article I will discuss some new ideas that can result in either modifying SQL statements or injecting SQL code even if the code has escaped the delimiting characters. I will start with some best practices for constructing delimited identifiers and SQL literals, and then I'll show you new ways attackers can inject SQL code in order to help you protect your applications.
2006-12-14
4,373 reads
A while back I wrote a quick post on setting up key mappings in...
By Steve Jones
In 100 years a lot of what we take to be true now will...
Hi, i'm running vs2022. I'm trying out a c# script that i'd like to...
Comments posted to this topic are about the item Missing the Jaro Winkler Distance
I upgraded a SQL Server 2019 instance to SQL Server 2025. I wanted to test the fuzzy string search functions. I run this code:
SELECT JARO_WINKLER_DISTANCE('tim', 'tom')
I get this error message:Msg 195, Level 15, State 10, Line 1 'JARO_WINKLER_DISTANCE' is not a recognized built-in function name.What is wrong? See possible answers