Viewing 15 posts - 42,301 through 42,315 (of 49,571 total)
clementhuge (12/18/2008)
However, by load balancing with several servers and let the round-robin clustering done by the application, I should achive load balancing, no?
How are you replicating the changes from one...
December 18, 2008 at 7:09 am
Grant Fritchey (12/18/2008)
I mean, did you ever see this before:
I have.
Great. Something else to worry about.
Not anymore.
Also, from that KB that you posted
Note In SQL Server 2005 Service Pack 3...
December 18, 2008 at 7:02 am
clementhuge (12/18/2008)
I would like to develop a high availability strategy for a company (both automatic failover and load balancing)
If I well understood clustering, it allows you to have n nodes...
December 18, 2008 at 6:50 am
Jack Corbett (12/18/2008)
The answer is "Yes"
I thought it was 42.
Tramp, can you state your question a little more clearly please? The question title gets cut off.
December 18, 2008 at 6:46 am
Grant Fritchey (12/18/2008)
From where I sit, there's still a bit more to learn here.
I think this is one of the areas of the internals where the more info you...
December 18, 2008 at 6:34 am
Ninja's_RGR'us (12/18/2008)
Well not really, it would almost be correct in Access which is probably where that all started.
I haven't worked in Access for so long I can't remember anything about...
December 18, 2008 at 5:51 am
thatok (12/18/2008)
Decryption By Password = N'HRTestPassword'
I hope you're going to make that password a little more complex in production.
December 18, 2008 at 5:51 am
Your syntax is completely incorrect.
Update TargetTable
SET TargetColumn = SourceColumn
FROM TargetTable INNER JOIN ....
December 18, 2008 at 5:28 am
What do you mean by "performance is slow"
Is this normal, or is the server unusually slow?
Have you made any changes recently?
Are there more users than normal?
Is there excessive blocking?
Are you...
December 18, 2008 at 5:27 am
If you are using SQL 2005, rather use the sys.dm_exec_sql_text than inputbuffer.
December 18, 2008 at 5:25 am
Look up the EncryptByKey and DecryptByKey functions in Books Online.
December 18, 2008 at 5:21 am
Username is typically a very bad choice for a clustered index. It's wide, it's nowhere near unique and it's not ever increasing. LOG_DATE_TIME may be a good candidate. Still need...
December 18, 2008 at 5:16 am
Did you read the links that Pradeep provided?
December 18, 2008 at 5:14 am
DBCC TRACEON (1222,-1)
The -1 turns it on globally. Without that the traceflag is only enabled for a single session, the one that turned it on. Since deadlocks are detected by...
December 18, 2008 at 5:13 am
Kiran (12/17/2008)
1. when will the log shrink for simple recovery model?
Never. The log is truncated on a checkpoint, meaning the inactive log records are discarded and the space made...
December 18, 2008 at 12:15 am
Viewing 15 posts - 42,301 through 42,315 (of 49,571 total)