Viewing 15 posts - 211 through 225 (of 610 total)
I get zip files ftp'd in daily and use an execute process task in SSIS to run the 7-zip executable and unpack them. The file and destination details are passed...
September 7, 2012 at 7:31 am
We keep both development and testing environments and restore copies of live back to both as above.
Regularly restoring a copy of live to dev or test is also a good...
September 7, 2012 at 7:27 am
Using connection managers etc like that just didn't work for us so I successfully use a script source task to read AD data using Imports System.DirectoryServices
and along these lines:
...
September 6, 2012 at 4:48 am
This security is the norm for us - only company supplied encrypted USB sticks will work on the machines, no cd or DVD or usb ports or bluetooth/infrared etc. Wall...
August 31, 2012 at 1:47 am
This was done by the base exchange and other stores when I stationed in England many years ago. We were in fact told NOT to bring US pennies with us...
August 31, 2012 at 1:23 am
We are "central IT" but the teams are split around the various business sites so also "local IT" but all part of the IT department and we have developed one...
August 29, 2012 at 2:55 am
As another Brit I can echo the above. Our holiday year ends on April 30th and there's always several taking leave in April to get down to the carry over...
August 20, 2012 at 2:06 am
Why C? Why not just programming skills in general? Language constructs and use are the important part. Fixing on the syntax of one language is too focused - the emphasis...
August 15, 2012 at 2:27 am
I was going to send the link to this to a colleague who's been learning unpivot BUT he'd probably be offended withthe mickey take at the top since his friend,...
August 2, 2012 at 1:22 am
In addition I use specially created domain accounts for the various sql agents as they need to validate the proxy account. They don't have privileges outside the server.
July 27, 2012 at 1:06 am
Create a credential which aliases to a domain account with the correct permissions and then a proxy to use that credential. In your sql agent jobstep to run the ssis...
July 25, 2012 at 3:38 am
"There are, of course, the classic general danger signs such as a fish-tank in the foyer, and a flagpole outside."
:laugh:
When you work for the government the danger sign is...
July 23, 2012 at 1:18 am
To achieve one true view you need "One true data source" and this is the stage that we're working towards in our business i.e. each piece of data is sourced...
July 12, 2012 at 1:41 am
The only ones who see us as a "tax" on company computer systems are the technical/network managers who can't understand why we do so many backups and need so much...
July 9, 2012 at 1:32 am
Sounds like you may have a clash with other scheduled tasks - backing up that database for example?
July 6, 2012 at 5:14 am
Viewing 15 posts - 211 through 225 (of 610 total)