Viewing 15 posts - 466 through 480 (of 14,953 total)
And yet again, I find out belatedly that I'm not quite usual/normal.
Never would have occured to me to go to a conference/whatever, without a specific goal and plan in mind....
November 28, 2012 at 6:50 am
Approximately how many rows does that table variable end up having in it when you run this?
November 28, 2012 at 6:40 am
pdanes (11/27/2012)
GSquared (11/27/2012)
pdanes (11/27/2012)
November 28, 2012 at 6:36 am
Search on this site is something Steve keeps mentioning and needing to be completely rebuilt.
I'm pretty sure most of us agree with him on that.
November 27, 2012 at 1:32 pm
If the OS is 64-bit, then simply upgrading should do it. Test on a dev/test copy of the server first.
November 27, 2012 at 11:38 am
Generally, you run a trace (Extended Events in SQL 2008 or later) for a long time, to find that kind of thing.
After all, what if a stored procedure is only...
November 27, 2012 at 11:37 am
You don't need all the nodes. XML, by default, doesn't contain nodes with NULL values, so the engine just assumes those are NULL if they're missing.
Untyped XML can actually...
November 27, 2012 at 11:28 am
Is there an active Deny in place on that role accessing the second table or the schema it's in? That works differently than merely missing a permission.
Another alternative, create...
November 27, 2012 at 11:21 am
Virtualization can add to latency, especially with older versions.
Whether that's the situation you are running into is something that would take actually digging into the server to determine. It's...
November 27, 2012 at 11:18 am
pdanes (11/27/2012)
November 27, 2012 at 11:13 am
You need to change the sequence of WHEN statements in your Case. Whatever you want to override something else, you need to have the override value first.
So, move your...
November 27, 2012 at 8:12 am
adb2303 (11/27/2012)
November 27, 2012 at 6:53 am
Server responses to overwhelming amounts of network traffic are often unpredictable. That's why DDOS attacks are a favorite cyber-terror tool (like the "hacking" that Anonymous does, which is mainly...
November 27, 2012 at 6:51 am
I'd need to see the proc to be able to help out here.
November 27, 2012 at 6:46 am
Have you tried using Extended Events instead of an old-style trace? Does that do the same thing?
November 27, 2012 at 6:44 am
Viewing 15 posts - 466 through 480 (of 14,953 total)