Forum Replies Created

Viewing 15 posts - 2,251 through 2,265 (of 6,038 total)

  • RE: T-SQL equivalent of To_number

    Provide examples of the most problematic values you're trying to convert.

  • RE: Attempting to change databases using cursor loop, but database won't change

    For this, you can leverage sp_MsForEachDB. It will execute the specified batch of T-SQL across all databases. For each iteration, the token ? will be dynamically substituted with the database...

  • RE: Coding Alternatives

    I know what you're talking about. If you have a stored procedure that accepts multiple parameters for performing searches (it seems every CRM type application has one), then dynamic SQL...

  • RE: Non-clustered index question

    Mike Scalise (9/20/2016)


    Hi,

    I tried to search for this but I haven't seen the question asked explicitly--and that may be because it's kind of dumb, but I'm interested in knowing the...

  • RE: The 10X Programmer

    Hopefully a job offer looking for a 10x DBA won't land you sitting alone in a server room with 9 empty chairs. :ermm:

  • RE: What random trash is in your drawer?

    Hopefully none of is have printed reports in our desk drawers containing personal information about customers. :ermm:

  • RE: Are You a Tech Company?

    Case in point:

    http://www.nytimes.com/2014/09/20/business/ex-employees-say-home-depot-left-data-vulnerable.html?_r=0


    .. Several former Home Depot employees said they were not surprised the company had been hacked. They said that over the years, when they sought new software...

  • RE: Contractors - What work do you consider to be in the 'DBA' realm?

    Essentially, DBA stands for "database administrator". If the organization has solutions deployed on SSIS, SSAS, or SSRS, then at the very least you'll be expected to manage those products on...

  • RE: SQL Server v Access re:security

    Steve Jones - SSC Editor (9/19/2016)


    Eric M Russell (9/19/2016)


    Most RDMS are air-tight from external hacking attempts when the DBA properly implements authentication and authorization.

    At least based on news reports...

  • RE: SQL Server v Access re:security

    If using MS Access as the database, then you can improve security by implementing something like a web services based data access layer. Specifically, the service account that the web...

  • RE: The Danger of xp_cmdshell

    By default, only a member of SYSADMIN can execute xp_cmdshell when enabled. If your developers and application users are members of SYSADMIN, they can simply enable xp_cmdshell themselves... and then...

  • RE: SQL Server v Access re:security

    Most RDMS are air-tight from external hacking attempts when the DBA properly implements authentication and authorization.

    At least based on news reports (and subsequent technical analysis by the industry), I'm...

  • RE: The 10X Programmer

    Any programmer will be X times more efficient when given an assignment that matches their skillset, a clear set of specifications, sufficient managmement/QA/DevOps support, and sufficiently sized blocks of uninterrupted...

  • RE: Down Tools Week 2016

    Gary Varga (9/16/2016)


    Eric M Russell (9/16/2016)


    ...during slow or "down" periods...

    What? Does not compute!!!

    I'm not a freelancer, so I don't have the option of context switching to another client. So, when...

  • RE: Down Tools Week 2016

    Rod at work (9/16/2016)


    (We've been having network problems this week so am late in reading any email.)

    I just read this. WOW, I am almost salivating reading about this Down Tools...

Viewing 15 posts - 2,251 through 2,265 (of 6,038 total)