Viewing 15 posts - 46 through 60 (of 75 total)
I didn't say I wasn't good at the "uh huh, yes dear" game; I'm pretty good at it. I even catch the "so its okay to buy that diamond ring and...
April 3, 2006 at 10:05 am
I think any conversation in the car is distracting, and detracts from someones ability to drive. Its not just cell phones that are the problem. Its also passengers who can start...
March 31, 2006 at 10:46 am
People have touched on a couple of points here.
Attention deficit is one product of all this connectivity. Many pundits have pointed out that "attention deficit" is really "noise overload+information deficit;"...
March 30, 2006 at 2:41 pm
While you're considering these, consider your licensing options and how that works in your environment. In our shop, we started with 5 floating licenses years ago. This requires a license...
March 23, 2006 at 10:39 am
If you can do reindexing or large data loads during off-periods and can guarantee no other update activity during that period, you can switch to simple recovery mode before, do the...
March 23, 2006 at 10:30 am
If security is an issue, you can set up job-specific stored procedures for them to execute to get current status/last run, history and restart the job. These job-specific stored procedures...
March 14, 2006 at 11:16 am
Bulk-logged mode will only affect bulk operations. See books on-line for a list of these. Examples are bcp, bulk insert, create index and rebuilding indexes.
So, if you drop indexes, do...
March 14, 2006 at 10:58 am
SQL Server normally uses the term "checkpoint" for the process that flushes all dirty pages out to the data files on disk. While this also flushes all the transaction records...
March 10, 2006 at 4:48 pm
Browse through the Books On-Line section on SQL Server Architecture, particularly the Relational Database Engine Architecture. Following references are within this subheading. Most of this applies to most multi-user DBMSs...
March 9, 2006 at 1:17 pm
Don't use WScript.exe, use CScript.exe.
The former is the Windows desktop version which pops up a window to allow parameters to be specified. This is the same as trying to use MsgBox...
March 8, 2006 at 5:03 pm
If you set the database recovery mode to the Simple Recovery Model, it automatically does a log truncation after every database checkpoint. As mentioned above, normally only development use. Also, a...
March 8, 2006 at 4:53 pm
A minor correction: the log is truncated at the end of each checkpoint. Checkpoints are independent of the begining and end of any transactions, so the active portion of the...
March 8, 2006 at 4:46 pm
You can also try the technique of "obfuscating" names. Common in certain programming languages, a process runs that renames all objects so they are meaningless.
However, if you allow users to...
March 8, 2006 at 4:31 pm
Instead of using DTS, you may have more success just scripting the stored procedures. I would script all database objects, including tables, and just use DTS to copy the data....
March 8, 2006 at 3:45 pm
The backup files contain the first and last LSNs in the backup. During a restore (before recovery), the database contains the last LSN that was applied, and will not allow...
February 13, 2006 at 12:12 pm
Viewing 15 posts - 46 through 60 (of 75 total)