SQL Overview VI - Monitoring Process Locks
In the sixth part of his series on monitoring your SQL Server, David Bird looks at process locks.
In the sixth part of his series on monitoring your SQL Server, David Bird looks at process locks.
Be reasonable. That's how Steve Jones thinks managers ought to behave towards their employees.
See a short and dirty example how to use temporary table in user defined function (UDF).
A set of 20 functions for URI and URL parsing, using .NET's native System.Uri parser
SQL Server Service Broker (SSBS) is a new architecture (introduced with SQL Server 2005 and enhanced further in SQL Server 2008 and later versions) that allows you to write asynchronous, decoupled, distributed, persistent, reliable, scalable and secure queuing/message-based applications within the database itself. Arshad Ali looks at how we can manage, monitor and troubleshoot Service Broker environments.
On Thursday July 20th, MCM Gaurav Aggarwal will provide an overview of the different options on MS platform for Hadoop
Steve Jones is your host introducing Grant Fritchey who'll present this webinar. This session explores the use of two Red Gate products, SQL Virtual Restore and SQL Source Control, in establishing a well-defined development process that allows for the use of known data sets and source code management of your database code. These tools work together to help you create a sandbox environment where you can test and develop your databases. Working with a development process is the best way to ensure a safe deployment process to protect your production systems.Developing software without establishing a good process can be a situation rife with the possibility of disaster.
Why don't employers want to fund training? Steve Jones has a few thoughts after a great piece that shows the lack of wisdom in withholding training.
This level covers the details of SQL Server transactional and merge replication, from understanding the basic terminology and methodology of setting up replication, to describing how it works and how the basic replication processes can be monitored.
It is certainly possible to fake an Array in SQL, but there are only a few occasions when it would be the best design. Most often, the wish for an array in SQL is a sign of a forlorn struggle against poorly-normalised data. One of the worst sins against Codd is the repeating group, as Joe Celko explains.
By HeyMo0sh
As someone who works in DevOps, I’m always focused on creating systems that are...
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
By Steve Jones
Learn how to tie a bowline knot. Practice in the dark. With one hand....
Comments posted to this topic are about the item Restoring On Top II
Comments posted to this topic are about the item SQL Art 2: St Patrick’s...
Comments posted to this topic are about the item Breaking Down Your Work
I have a database, DNRTest, that has a number of tables and other objects in it. The other day, I was trying to mock up a test and ran this code on the same server:
-- run yesterday CREATE DATABASE DNRTest2 GO USE DNRTest2 GO CREATE TABLE NewTable (id INT) GOToday, I realize that I need a copy of DNRTest for another mockup, and I run this:
-- run today USE Master BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO RESTORE DATABASE DNRTest2 FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens? See possible answers