Stored procedure: Search character columns for a given string
This tip continues the system stored procedure series with a routine to find occurrences of a string in the character columns of selected tables.
2005-09-30
3,781 reads
This tip continues the system stored procedure series with a routine to find occurrences of a string in the character columns of selected tables.
2005-09-30
3,781 reads
The second installment of this series discussed the cost of maintaining systems with various levels of downtime, ways data can be lost, and what constitutes a backup. In this installment, I discuss how to configure your hardware to minimize the need to restore a backup.
2005-09-29
2,398 reads
The File Watcher Task does what it says really, it watches a folder waiting for files. When an available file is found the task completes, returning the name of the file for later use.
The task will detect changes to existing files as well as new files, both actions will cause the file to be found when available. A file is available when the task can open it exclusively. This is important for files that take a long time to be written, such as large files, or those that are just written slowly or delivered via a slow network link.
2005-09-28
3,505 reads
We all know the "TOP" clause returns the first n number of rows or percentage of rows thereby limiting the number of resulting rows displayed when we are selecting rows in a table.
SQL Server 2005 is packed with new features and enhancements. One of the enhancements in SQL 2005 that we are going to see is the clause, "TOP." The "TOP" clause will now allow us to do Data Manipulation and also allow similar criteria results to be displayed by using the TIES option.
2005-09-27
3,710 reads
Long anticipated, the arrival of radically restructured database architectures is now finally at hand.
2005-09-26
4,166 reads
Richard Hundhausen is the author of Building Web Applications with ADO.NET and XML Web Services and Programming ADO.NET, both from Wiley, as well as the upcoming Working with Microsoft Visual Studio 2005 Team System from Microsoft Press. He is also a trainer, teaching numerous courses and speaking at conferences such as VSLive and Tech Ed.
2005-09-23
1,676 reads
There has been a lot of interest in the web-facing community lately about a new useability feature that goes by a number of different names—XMLHTTP, AJAX, out-of-band requests, and asynchronous client script callbacks, to name a few.
Regardless of the name, this feature provides a way for a standard web page to make calls back to the server, without a traditional page refresh. The user is oblivious to the fact that a server call has occurred, and is not interrupted by it.
2005-09-20
2,167 reads
n this lesson, we will examine another function / property in the MDX toolset, the .UniqueName function. The general purpose of the .UniqueName function is to return the Unique Name of the object to which it is appended. .UniqueName can be used in conjunction with hierarchies, dimensions, levels, and members, in a manner similar to the .Name function that we examined in String Functions: The .Name Function, and, also like .Name, .UniqueName can be useful in a host of different applications.
2005-09-19
1,744 reads
In order for a transaction to meet the requirements of ACID, locks are employed to insure data integrity and multi-user access. The scope, or number of rows held by a lock, is referred to as Lock Granularity. This month, we will begin by introducing several different types of lock modes employed by MS SQL.
2005-09-16
3,544 reads
The regular expression transformation exposes the power of regular expression matching within the pipeline. One or more columns can be selected, and for each column an individual expression can be applied. If all columns selected pass their tests then rows are passed down the successful match output. Rows that fail to pass all tests are directed down the alternate output.
2005-09-13
1,907 reads
By Andy Warren
Somehow two years have elapsed since my last update; hopefully it won’t be that...
By Steve Jones
If someone is trying to convince you it’s not a pyramid scheme, it’s a...
By Steve Jones
I was looking back at my year and decided to see if SQL Prompt...
I have table: t1 in schema1 with 19 billion records. I have another table...
Comments posted to this topic are about the item Minimally Viable Security
Comments posted to this topic are about the item Encoding NULL
What is returned from this code in SQL Server 2025?
SELECT BASE64_ENCODE(NULL)See possible answers