A Call to Arms
Long anticipated, the arrival of radically restructured database architectures is now finally at hand.
2005-09-26
4,166 reads
Long anticipated, the arrival of radically restructured database architectures is now finally at hand.
2005-09-26
4,166 reads
Richard Hundhausen is the author of Building Web Applications with ADO.NET and XML Web Services and Programming ADO.NET, both from Wiley, as well as the upcoming Working with Microsoft Visual Studio 2005 Team System from Microsoft Press. He is also a trainer, teaching numerous courses and speaking at conferences such as VSLive and Tech Ed.
2005-09-23
1,676 reads
There has been a lot of interest in the web-facing community lately about a new useability feature that goes by a number of different names—XMLHTTP, AJAX, out-of-band requests, and asynchronous client script callbacks, to name a few.
Regardless of the name, this feature provides a way for a standard web page to make calls back to the server, without a traditional page refresh. The user is oblivious to the fact that a server call has occurred, and is not interrupted by it.
2005-09-20
2,167 reads
This is a function that takes a start date and end date as parameters and returns the number of weekdays (Monday to Friday) in between. This function assumes that Sunday is set as the first day of the week. Adapted from a vb function that I wrote to calculate standard salary costs for billing purposes. […]
2005-09-19 (first published: 2004-10-16)
301 reads
n this lesson, we will examine another function / property in the MDX toolset, the .UniqueName function. The general purpose of the .UniqueName function is to return the Unique Name of the object to which it is appended. .UniqueName can be used in conjunction with hierarchies, dimensions, levels, and members, in a manner similar to the .Name function that we examined in String Functions: The .Name Function, and, also like .Name, .UniqueName can be useful in a host of different applications.
2005-09-19
1,744 reads
This script will document tables (including constraints and triggers, row counts, sizes on disk), views (including all used fields), stored procedures (including used fields and parameters), database users, database settings and server settings.This script has been cobbled together from several others found on this site, so they deserve the recognition, not me 🙂Simply execute it […]
2005-09-16 (first published: 2004-09-02)
376 reads
In order for a transaction to meet the requirements of ACID, locks are employed to insure data integrity and multi-user access. The scope, or number of rows held by a lock, is referred to as Lock Granularity. This month, we will begin by introducing several different types of lock modes employed by MS SQL.
2005-09-16
3,544 reads
The regular expression transformation exposes the power of regular expression matching within the pipeline. One or more columns can be selected, and for each column an individual expression can be applied. If all columns selected pass their tests then rows are passed down the successful match output. Rows that fail to pass all tests are directed down the alternate output.
2005-09-13
1,907 reads
Lest the headline mislead you as to my biases, I consider software patents to be both stupid and insane. I raise this issue because it is currently rearing its ugly mug in the world of open source software, but it has affected much development in the proprietary worlds of Windows as well.
First of all, patent laws were created long ago, which is not to say the thinking was correct then either, but we have to recognize the intellectual and technological climate back then.
2005-09-09
2,760 reads
Don Kiely contends that exercising administrative rights over our computers is a major cause of insecure systems. In the first of five articles, he explains the concept of "least privilege" and shows why software developers should be happy to operate as "mere users."
2005-09-08
2,801 reads
Welcome back, my fellow sleuths, to my mystery-inspired blog series! I’m having a ton...
By Steve Jones
This was one of the original values: The facing page has this text: No...
By Chris Yates
For decades, enterprises have thought about data like plumbers think about water: you build...
Comments posted to this topic are about the item Create an HTML Report on...
Comments posted to this topic are about the item I Love Editorials
Hi everyone I have a 1000 plus line query and I am getting an...
What happens when I run this code:
DECLARE @s VARCHAR(1000) = 'apple, pear, peach' SELECT * FROM STRING_SPLIT(@s, ', ')See possible answers