Viewing 15 posts - 1,771 through 1,785 (of 4,272 total)
So it sounds like you are joining to code to get id. Ok, provided Code is unique you could easily index it in a table variable.
I tend to take...
January 7, 2011 at 12:29 pm
You can create a PKey index on a table variable but thats it.. As far as the choice between them, I had two thoughts:
1. If the table is narrow,...
January 7, 2011 at 11:46 am
I'm with Lowell on this one, using a binary for a PKey raised flags for me immediately, I cannot think of a case where I would ever do this.
As far...
January 7, 2011 at 11:35 am
Steve, I have to partially disagree.. It is very common to make the SQL service account a local admin on the box, not a best practice but still very...
January 7, 2011 at 11:26 am
My understanding is that for non-sysadmin users (2000/2005/2008) that are able to use xp_cmdshell it will use a proxy account, where that account is setup changed (I think) in 2005/2008,...
January 6, 2011 at 2:23 pm
mandavli (1/6/2011)
declare @setval as integer
set @setVal = getCalcvalue(@value1,@value2)
-- based on value i receive from function there are fuether...
January 6, 2011 at 12:21 pm
I have to say it isn't really all that hard to at least keep a variable that says *something* has changed. However, IF the best practice of using a...
January 6, 2011 at 9:38 am
The question I have is what are you looking for exactly? Just a SQL Server host? You don't want to or don't have any SQL licenses yourself? ...
January 4, 2011 at 8:45 am
As Gila said, SQL loves memory, it wll take all available to it if you let it. Depending on how much physical memory the system has depends on how...
December 30, 2010 at 1:27 pm
I have had no end to trouble with mapped drives when not connected as an interactive user. I strongly suggest using a UNC path instead of a mapped drive.
CEWII
December 30, 2010 at 1:17 pm
If I understand your question..
There really is no way to edit a package outside the GUI. You can try notepad or any XML editor but I can almost guarantee...
December 30, 2010 at 12:59 pm
Full database encryption is usually what I refer to as lazy encryption. It only protects data at rest and doesn't protect against someone who has access to the data....
December 30, 2010 at 12:26 pm
You could (temporarily) change the package protection level to something else like Encrypt with User Key or password. Then enter a username/password. Don't forget to change it back...
December 30, 2010 at 12:00 pm
While being specific with BEGIN DISTRIBUTED TRANSACTION is a good practice, I will say that the DB Engine is smart enough to know that it is a distributed transaction and...
December 30, 2010 at 11:18 am
Viewing 15 posts - 1,771 through 1,785 (of 4,272 total)