Viewing 15 posts - 841 through 855 (of 2,268 total)
then the easiest way woud be to create an application is VSA to do this, this would mean that your spreadsheet is behaving like a front-end application
September 16, 2010 at 10:26 am
you could write something with VSA to update the database as a new row is entered.
or you could create a ssis package that read the file after it has been...
September 16, 2010 at 10:15 am
Derrick Smith (9/16/2010)
I also disagree with this - completely unnecessary. Prefixing tables with 't' or 'tbl' and stored procs with 'sp'..sure.
I don't really want to start...
September 16, 2010 at 9:51 am
SELECT firstname,lastname into [NEWTABLENAME] FROM Employees
September 16, 2010 at 7:15 am
Well you don't need the word 'outer'
I guess it depends, i always use left join as I like to think from the left when bulding queries, other people may...
September 16, 2010 at 6:30 am
I wouldn't do it like that, a column name should reflect whats in the column there is no need for prefixes..
I would follow Celko's advice.
September 16, 2010 at 5:57 am
you could also use data compare from red-gate
September 16, 2010 at 3:02 am
it looks like a permission issue
I would start by checking the sql server error log
September 15, 2010 at 10:05 am
I am not sure that there is an equivalent of SUSER_SNAME()
but you could possibly get the info from sysprocesses.
select hostname from sys.sysprocesses
where sid = SUSER_SID()
this is only a suggestion...
September 15, 2010 at 8:58 am
and what service pack are you running?
I have had issues like this prior to installing SP2
September 15, 2010 at 8:42 am
I usually write a webservice to call the stored procedures, then use a tool such as SOAPUI to load up hundreds of instances of the webservice at the same...
September 15, 2010 at 6:50 am
they should have an idea, even if the code is in a compiled DLL the developer who included that DLL in their code should know what it does and...
September 15, 2010 at 6:02 am
it depends on your relationship with them, if you employed them and they wrote the software for you and you own the data then they should.
September 15, 2010 at 5:14 am
you will need to ask them what kind of encyption they used and the salt values.
And assuming they used one of the standard ones, you can implement this yourself in...
September 15, 2010 at 5:04 am
it depends on how they are encrypted, if they use simple md5 hashing it is possible to convert them back if you know the salt value.
however if they are...
September 15, 2010 at 4:49 am
Viewing 15 posts - 841 through 855 (of 2,268 total)