VSLive Interview with Tom Rizzo and David Campbell
An interview where they discuss their data strategy and integration with Visual Studio .Net
2003-02-12
3,288 reads
An interview where they discuss their data strategy and integration with Visual Studio .Net
2003-02-12
3,288 reads
This article by Simon Galbraith (from Red-Gate Software, one of our valued advertisers!) in .Net Magazine talks about how to calculate ROI when evaluating software purchases.
2003-02-03
1,058 reads
Ever tried to open 1 Gig ASCII file with Notepad? WordPad? Do you remember ASCII codes of Tab and Carriage Return? Enter Terminator; huge ASCII file viewer and BCP helper. Terminator reads top 10 (and more if asked) records of ASCII file of any size. It detects record terminators and calculates current cursor position (field offset) and length of selected area (field length). Best of all, it's free!
2003-01-29
119 reads
Moving SQL Server from one computer to another is not a very difficult thing to do, but it often stumps newbie DBAs. Of course, it needs careful planning to ensure that the SQL Server is moved completely and properly to the new machine, and with a minimal downtime and no data loss. This article introduces you to a couple of methods you can employ to move/migrate SQL Server from one computer to another.
2003-01-24
107 reads
This application will convert your schema into a standard Word document. Try before you buy, they have two versions - both under $200.
2003-01-23
623 reads
This article is the first of a series that I plan on writing and placing on my website to help other DBAs in auditing a new SQL Server environment. This article deals with determing which SQL Server logins have weak passwords, with the definition of weak being, no password, password the same as the login name or having a password of only one character.The stored procedure used for this article is embedded in the article and it has been submitted as a independent script named spAuditPasswords.
2003-01-21
66 reads
David Gugick, SQL Server performance expert and software developer, provides over 100 tips on how to boost SQL Server performance.
2003-01-17
88 reads
Microsoft tells us why it's so important to defend your code against malicious attacks.
2003-01-10
243 reads
This article provides you with a simple stored procedure, that can search all the columns of all the tables in the current database, and replace a given search string with another string.
2002-12-31
1,269 reads
Unfortunately, there is no built-in support for arrays in SQL Server's T-SQL. This article provides 5 different techniques to simulate arrays in T-SQL, with working examples. It also provides you with links to additional information and books.
2002-12-27
82 reads
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
By Steve Jones
Learn how to tie a bowline knot. Practice in the dark. With one hand....
By HeyMo0sh
As a DevOps practitioner, I’ve always focused on performance, scalability, and automation. But as...
Hi everyone I asked this earlier but the desired outcome is a bit different...
Hi, I have a SQL Server instance where users connect to via Windows Authentication,...
Comments posted to this topic are about the item Multiple Deployment Processes
I have a query from a former DBA that we run on SQL Server 2025 to check on database metadata. This query references sys.sysaltfiles. I want to refactor this code to be more modern. Which DMV should I reference instead?
See possible answers