Viewing 15 posts - 601 through 615 (of 1,048 total)
Arman Khan (3/31/2011)
There are no such a document... Just they told me the way application will work..
Then you must create them. To start writing (i.e. hacking) code and designing databases...
March 31, 2011 at 10:30 am
??
A requirements document and a functional specification would be my first step.
March 31, 2011 at 9:33 am
It appears the other assembly reference the other assembly version 2.0 We don't don;t know if it is specifically needing that version (probably referring to .NET 2.0) or it...
March 31, 2011 at 9:29 am
read this: http://support.microsoft.com/kb/302340
March 31, 2011 at 9:11 am
did you sign the assembly? Does the assembly really need to be unsafe? You will probably have to set the database as trustworthy if so.
March 31, 2011 at 8:57 am
What I do is script out the logins and agent jobs (which can also change BTW) daily and they get shipped to the standby servers along with the backups and...
March 31, 2011 at 8:26 am
I don't see where that is an issue in and of itself. One of the reasons connection pooling was invented was to fix the resource intensive philosophy of making and...
March 30, 2011 at 9:52 am
Can you post your CLR code? from the error messages it sort of looks like it is trying to connect to a database server. That would not work unless the...
March 29, 2011 at 2:38 pm
Set is lower overhead and faster for simple variable assignments and computations. The select statement is of course capable of an extensive array of set based operations.
For all the...
March 29, 2011 at 12:18 pm
You can configure the linked server to use several different security methodologies depending upon what you need.
March 29, 2011 at 12:10 pm
what errors are you getting?
March 25, 2011 at 11:53 am
what is in the dbo.[A] table? does it have any rows in it?
Try eliminating the "from dbo.[A]...." and see what happens. but I am thinking what you need is...
March 24, 2011 at 2:01 pm
Full text indexes may be a better approach than trying to do leading wild card searches on a very large table.
March 24, 2011 at 11:54 am
Two that I use alot around here:
convert a string based IP address into a 64 bit integer.
encryption & decryption & key management functions.
March 21, 2011 at 1:11 pm
Viewing 15 posts - 601 through 615 (of 1,048 total)