Viewing 15 posts - 4,831 through 4,845 (of 6,026 total)
OracleBoy (7/24/2013)
I want to know the size attribute to pools , memory , cache ...
It's not possible to know if user can create for...
July 25, 2013 at 1:46 pm
In SSMS, you can right click an object and select 'View Dependencies'.
July 25, 2013 at 1:35 pm
Zeal-DBA (7/25/2013)
thanks for such a good explaination, actually there are already multiple running applications and it is not possible to remove logins from sysadmin role or cant modify any...
July 25, 2013 at 1:28 pm
The simple truth of the matter is that if the users are members of SYSADMIN role, then they own your database. Your organzation doesn't have one or two DBA's, it...
July 25, 2013 at 1:09 pm
mohan.bndr (7/24/2013)
July 25, 2013 at 12:44 pm
Are you sure you personally are a consultant?
If you're paid a salary by your employer, then you're no more a consultant than the receptionist is, even if your...
July 23, 2013 at 2:40 pm
You can call your process whatever you want, but what really matters are requirements, ticketing of tasks and bugs, source control, peer review of code, seperate dev / qa,...
July 23, 2013 at 1:03 pm
Steve Jones - SSC Editor (7/19/2013)
djackson 22568 (7/18/2013)
July 19, 2013 at 12:16 pm
jdbrown239 (7/18/2013)
Thanks Sean that worked. I also found that substring worked too.
update XDDDepositor
SET XDDdepositor.WBeneName = Vendor.RemitName,
XDDDepositor.WBeneAddr = SUBSTRING( Vendor.RemitAddr1,0, 35),
XDDDepositor.WBeneAddr2 = SUBSTRING( Vendor.RemitAddr2, 0 , 35),
XDDDepositor.WBeneCity = Vendor.RemitCity,
XDDDepositor.WBeneState = Vendor.RemitState,
XDDDepositor.WBeneZipPostal...
July 18, 2013 at 3:32 pm
In addition to protecting login credentials of accounts, another layer of security is at the firewall configuration level with IP blocking. That way, even if someone finds a sticky note...
July 18, 2013 at 8:06 am
The best service that data professionals can do for the benefit of mankind is to keep the database locked down and secure.
July 17, 2013 at 10:34 am
Obviously this concept of data philanthropy, sharing corporate data with the world for the good of hunamkind, should be left up executive management. Please run it past your boss first.
July 17, 2013 at 8:57 am
Based on news stories, it seems to me that the vast majority of data breaches, and the ones that the most massive in scale, are the result of inadequate role...
July 16, 2013 at 7:30 am
anon_tyrant (7/15/2013)
July 16, 2013 at 6:55 am
I have a beefy desktop sitting under a rarely used desk, and I VPN into that from a laptop. Thanks to VPN, the laptop is a cheap $350 model and...
July 15, 2013 at 7:43 am
Viewing 15 posts - 4,831 through 4,845 (of 6,026 total)