Kill That Target!
Having trouble with a target server (TSX)? Steve Jones did in his environment. Read about how he worked around the issue to restore administrative capabilities.
2002-09-16
7,233 reads
Having trouble with a target server (TSX)? Steve Jones did in his environment. Read about how he worked around the issue to restore administrative capabilities.
2002-09-16
7,233 reads
This article discusses the advantages and disadvantages of using the SQL Server graphical administration tools (Enterprise Manager) versus the T-SQL administrative commands, with specific examples. Read up and decide for yourself, if you want to be a point-and-click DBA or a T-SQL scripting expert!
2002-09-04
781 reads
Part 4 examines more ANSI options that are available in SQL Server. A simple setting with some unexpected (for the author) results.
2002-09-03
4,743 reads
In this follow up to one of our most popular articles, Andy responds to comments posted by readers and discusses how to manage SQL logins effectively in your applications.
2002-08-19
6,809 reads
This article briefly discusses SQL Server's data and procedure cache and shows you the common Transact-SQL statements/command and system tables that you can use to interact with the cache through Transact-SQL.
2002-08-15
14,137 reads
When transferring a database to a new server, you are bound to experience a user problem. In this article by Neil Boyle, he shows you how to transfer passwords and accounts seamlessly to a new server.
2007-10-02 (first published: 2002-08-14)
24,583 reads
Bill Wunder has done it again with his newest release of his DDL Archive Utility, which can pull entire schemas into Source Safe automatically.
2002-08-13
196 reads
Recently Steve Jones noticed that someone wanted to use a UDF to enforce uniqueness. No big deal, right? Well this person wanted to enforce uniqueness based on some other column value. A bit of a challenge, but this article presents a couple ways to handle this.
2002-08-12
4,255 reads
Get a sneak peak of some of the sections from Start to Finish Guide to SQL Server Performance Monitor. Find out what counters to watch and what their thresholds are.
2002-08-06
21,277 reads
This article explains how orphan users get created, and provides you with troubleshooting information. A bonus stored procedure called ShowOrphanUsers is included, that goes and searches all the databases and generates a complete list of orphan users.
2002-08-06
1,038 reads
By Brian Kelley
In information security (INFOSEC), there several foundational concepts and principles. One of the ones...
By Steve Jones
the standard blues– n. the dispiriting awareness that the twists and turns of your...
By Chris Yates
A brief introduction to the tool and its advantages for database migrations DevOps is...
I'm tracing activity on one database and would like to include the client_app_name in...
select Custno, Addr1, City, Res_Phone, Bus_Phone, Fax_Phone, Marine_Phone, Pager_Phone, Other_Phone, email1, email2 from customer...
I'm only processing 50,000 records not everything from the Table where there are 250,00...
I want to mark a transaction in the log as a recovery point. How do I do this in my code if I use the transaction, myTran?
See possible answers