Viewing 15 posts - 4,726 through 4,740 (of 6,105 total)
We do the files on the file system for our Intranet, but that's because we keep the files on the web server. We take the IDENTITY value generated by SQL...
December 24, 2002 at 9:27 am
If you run an NBTSTAT -a on the SQL Server, you can figure out where it's resolving. Here are the NetBIOS codes:
http://support.microsoft.com/default.aspx?scid=kb;en-us;163409
We've had some problems where our servers are resolving...
December 24, 2002 at 9:22 am
All right, the catch is you can't use foreach like you'd do FOR EACH in VBScript. You have to get each item individually, and of course, the array index starts...
December 23, 2002 at 7:12 pm
A bit more about the problem...
Perl's Win32::OLE
doesn't seem to handle the ADODB.Errors object well. We've been trying to figure
out how to do the equivalent of:
For Each oError in oRst.ActiveConnection.Errors
...
December 23, 2002 at 11:53 am
This should go without saying but...
Rely on the algorithms that have been tested by the crypto community and found thus far to be strong... ones where if the attacker knows...
December 20, 2002 at 10:00 pm
Do you mean setting a lock timeout value?
K. Brian Kelley
http://www.truthsolutions.com/
Author: Start to Finish Guide to SQL Server Performance Monitoring
http://www.netimpress.com/shop/product.asp?ProductID=NI-SQL1
December 19, 2002 at 9:36 am
1) A primary key can be non-clustered.
2) A unique index will allow one null value. Of course, if the column is set to NOT NULL, it won't.
December 19, 2002 at 9:32 am
You're going to actually have to parse it. It's in the format:
hhmmss
Where hh is the hours in 24-hour format. Not typically what you'd expect (usually when you see integer here...
December 18, 2002 at 9:22 am
Best practice says only servers directly exposed to the outside should be in the DMZ. Unless you're doing direct B2B connections or something of that sort, get that DB server...
December 18, 2002 at 8:09 am
quote:
5b. When I login on a remote client as TedN, use QA with "Windows Authentication" to access the Sql server, I get...
December 18, 2002 at 8:01 am
If you set the connection to named pipes, a shared memory protocol, you shouldn't see network traffic. Keep in mind that while TCP/IP is faster across the wire, shared memory...
December 18, 2002 at 7:55 am
One word: Sa-weet! Now to see if we can get a test in-house.
K. Brian Kelley
http://www.truthsolutions.com/
Author: Start to Finish Guide to SQL Server Performance Monitoring
http://www.netimpress.com/shop/product.asp?ProductID=NI-SQL1
December 17, 2002 at 3:52 pm
The SQL Server 2K Resource Kit is on-line as well:
http://www.microsoft.com/technet/prodtechnol/sql/reskit/sql2000/sql2kres.asp
K. Brian Kelley
http://www.truthsolutions.com/
Author: Start to Finish Guide to SQL Server Performance Monitoring
http://www.netimpress.com/shop/product.asp?ProductID=NI-SQL1
December 16, 2002 at 8:48 am
quote:
I understand that the SQL Virtual Cluster assumes the MAC address of the new server.
Each...
December 13, 2002 at 6:58 am
Just to piggyback on Steve... SSL protects the data stream as it goes across the wire. That means if you're worried about someone sniffing the traffic between the web server...
December 13, 2002 at 6:48 am
Viewing 15 posts - 4,726 through 4,740 (of 6,105 total)