CLR: Reflections on Reflection
Do you wish callers of your library could describe their types to you programmatically? Read a little about reflection in CLR Programming.
2007-07-20
2,249 reads
Do you wish callers of your library could describe their types to you programmatically? Read a little about reflection in CLR Programming.
2007-07-20
2,249 reads
This article describes how to provide full text search using Microsoft Indexing Service in .NET applications.
2007-07-20
2,379 reads
SQL Server Integration Services (SSIS) includes two very interesting transforms, the Fuzzy Grouping and Fuzzy Lookup transformations. Brian Norberg discussed the former in another article and this time examines the Fuzzy Lookup Transformation.
2007-07-19
10,258 reads
SSIS introduced a feature called "Package Configurations". Package configurations allow us to make SSIS packages portable and help us change SQL Server and file connectivity information dynamically.
2007-07-19
2,738 reads
Concurrency and transaction isolation are a prickly subject, difficult to explain with any kind of clarity without boring the reader and leaving their poor brain in a complete muddle. Therefore, it is often ignored in the vain hope it won't affect us and we can forget all about it. Well you can't ignore it any more and with SQL Server 2005 there's a whole new isolation level added to the four that already exist.
2007-07-19
2,385 reads
2007-07-18
2,936 reads
You are asked for the sa password for a SQL Server in order to perform a software upgrade. You, the DBA, don't know the password and it's not documented. Rodney Landrum provides a way out of this dilemma, demonstrating two techniques for temporarily changing the password, and then returning it to its previous unknown value.
2007-07-18
4,312 reads
Many state data-breach laws exempt encrypted data from PR-nightmare public-notice requirements, but don't let that fool you into thinking it's an easy answer to the data privacy challenge. Here's the lowdown on loopholes, caveats and options to consider when applying encryption.
2007-07-17
2,316 reads
In this article, I'll show you how to create a generic scheduler that runs on a Windows Service. The scheduler will be able to accept pluggable actions that we can develop later implementing a custom interface.
Background
2007-07-17
3,240 reads
SQL Server 2005 has greatly increased the capabilities of the platform and brought the capabilities for complex ETL packages to many businesses at an affordable cost. One of the very interesting transformations you can use in SSIS is the fuzzy grouping task and new author Brian Nordberg brings us a look at how you can use this.
2007-07-16
8,414 reads
By Steve Jones
Recently I had someone internally ask about whether SQL Source Control supports Git Hooks....
By Steve Jones
At Redgate, we’re experimenting with how AI can help developers and DBAs become better...
I was messing around performing investigative work on a pod running SQL Server 2025...
Comments posted to this topic are about the item Encoding Strings
Comments posted to this topic are about the item Deep Learning and Craftsmanship Matter
Comments posted to this topic are about the item Building a Real-Time Analytics Pipeline...
I have this code in SQL Server 2025. What is the result?
DECLARE @message VARCHAR(50) = 'Hello SQL Server 2025!'; DECLARE @encoded VARCHAR(MAX); SET @encoded = BASE64_ENCODE(@message); SELECT @encoded AS EncodedResult;See possible answers