What's ROI Got to Do With It?
This article by Simon Galbraith (from Red-Gate Software, one of our valued advertisers!) in .Net Magazine talks about how to calculate ROI when evaluating software purchases.
2003-02-03
1,058 reads
This article by Simon Galbraith (from Red-Gate Software, one of our valued advertisers!) in .Net Magazine talks about how to calculate ROI when evaluating software purchases.
2003-02-03
1,058 reads
Ever tried to open 1 Gig ASCII file with Notepad? WordPad? Do you remember ASCII codes of Tab and Carriage Return? Enter Terminator; huge ASCII file viewer and BCP helper. Terminator reads top 10 (and more if asked) records of ASCII file of any size. It detects record terminators and calculates current cursor position (field offset) and length of selected area (field length). Best of all, it's free!
2003-01-29
114 reads
Moving SQL Server from one computer to another is not a very difficult thing to do, but it often stumps newbie DBAs. Of course, it needs careful planning to ensure that the SQL Server is moved completely and properly to the new machine, and with a minimal downtime and no data loss. This article introduces you to a couple of methods you can employ to move/migrate SQL Server from one computer to another.
2003-01-24
107 reads
This application will convert your schema into a standard Word document. Try before you buy, they have two versions - both under $200.
2003-01-23
623 reads
This article is the first of a series that I plan on writing and placing on my website to help other DBAs in auditing a new SQL Server environment. This article deals with determing which SQL Server logins have weak passwords, with the definition of weak being, no password, password the same as the login name or having a password of only one character.The stored procedure used for this article is embedded in the article and it has been submitted as a independent script named spAuditPasswords.
2003-01-21
66 reads
David Gugick, SQL Server performance expert and software developer, provides over 100 tips on how to boost SQL Server performance.
2003-01-17
88 reads
Microsoft tells us why it's so important to defend your code against malicious attacks.
2003-01-10
243 reads
This article provides you with a simple stored procedure, that can search all the columns of all the tables in the current database, and replace a given search string with another string.
2002-12-31
1,269 reads
Unfortunately, there is no built-in support for arrays in SQL Server's T-SQL. This article provides 5 different techniques to simulate arrays in T-SQL, with working examples. It also provides you with links to additional information and books.
2002-12-27
82 reads
forceSQL v2.0 is a much improved version of our SQL Password command-line tool. It now incorporates Brute Force in addition to Dictionary attacks. It works significantly faster because it now bypassess the SQL/ODBC API and directly goes to the network.
A free download and a much more detailed description is available at http://www.nii.co.in/tools.html
2002-12-23
48 reads
By Steve Jones
If it fails where you thought it would fail that is not a failure....
Quite a long title for a short blog post ??While deploying a DACPAC (from...
By Kevin3NF
Some of the best career enhancers you can buy. Why I Go to...
Comments posted to this topic are about the item A Place where AI Technology...
What happens when I run this on SQL Server 2022 in the AdventureWorks2022 database?
SELECT OBJECT_DEFINITION (OBJECT_ID(N'dbo.uspGetBillofMaterials')) AS [Object Definition]; GOSee possible answers