Viewing 15 posts - 2,356 through 2,370 (of 6,216 total)
Why a best practice? You save a couple lines of code, but you trade off the strong client side type checking. I tend to use a code generator, so using...
March 31, 2003 at 3:39 pm
I'd agree on all counts. Sorry about that. Scorpion, you don't have all that wrapped up into a proc(s)?
Andy
March 31, 2003 at 2:27 pm
I've always preferred to run my backups before I do index rebuild and integrity check, my theory being that if something goes wrong during either of those two I'd like...
March 31, 2003 at 11:20 am
March 30, 2003 at 7:12 pm
Try increasing the timeout on the logreader. I've seen this happen when there is an extremely large transaction in the log, the log reader has to read through all of...
March 30, 2003 at 1:58 pm
Person A inserts the row and populates three columns, Person B then updates three other columns? If you know that A will only do those three and B the other...
March 29, 2003 at 6:20 pm
Could also do it the other way around, write some Access code to loop through your objects to generate the code to create the indexes. Don't know that one way...
March 29, 2003 at 6:19 pm
You have the option to run the agent on the publisher or subscriber, I usually use push (publisher) option, more as a preference than anything.
Andy
March 29, 2003 at 5:53 am
I have zero exp with either - wow, 6.0 goes back a ways! I'd guess the place to start would be Oracle, you'd think the 6.0 db would be accessible...
March 29, 2003 at 5:51 am
I like objects, but I think what you're doing (though very common) abstracts the intent one layer too much. I'd rather see a fully declared proc inside a method call,...
March 28, 2003 at 5:42 pm
The first param is the login name, the second is the password for the login.
Andy
March 27, 2003 at 3:25 pm
I think whether you break up the logs onto separate drives (and in extreme cases separate HBA's) is situational, regardless of the current best practices. If you've got a 1TB...
March 27, 2003 at 6:15 am
I like the complete listing idea. Sometimes it's hard enough just to figure out what tools/options there are in a given space.
To follow up on Steve's comment in the interest...
March 27, 2003 at 6:08 am
If you have SQL2K, you can use scope_identity. Other option would be to not us an identity in one of the tables, perhaps using uniqueidentifier with newid() instead.
Andy
March 24, 2003 at 1:25 pm
You can modify the snapshot to send some of that stuff over, or use a post snapshot script.
Andy
March 24, 2003 at 12:49 pm
Viewing 15 posts - 2,356 through 2,370 (of 6,216 total)