Secure Programming
Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.
Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.
This article from Zach Mattson shows how you can set up custom error handling in your SSIS packages. Learn how to direct those error rows to another component for separate processing.
This SQL School video will introduce you to the INTERSECT command in T-SQL. MVP Andy Warren explains how this command allows you to find matching rows in a join and a UNION.
In a recent blog post, SQL Server expert Denny Cherry discusses adding a user interface to his Standalone SQL Agent, a replacement for the SQL Server Agent service.
This article shows the steps to analyze SQL Server logins and permissions to ensure that there are no logins and users that exist who are have unnecessary access
I received a review copy of Murach's SQL Server 2008 For Developers a couple months back and just finished up looking through it. In general I've always liked the style of the Murach books; short lessons that flow about as logically as you can do it when it often seems like you need to know it all to get anything done!
This year, I was asked to participate on the PASS Program Committee Management team as the “Speaker Manager.” One of my tasks is to create a Speaker’s Resource page on the SQLPASS.org website to aid speakers who want to submit session abstracts for the 2009 PASS Summit, which will be held in Seattle, WA from November 3 — 6, 2009.
SQL Server 2005 system views and Reporting Services are combined to break down tempdb utilization into its individual components in real time.
In the news this week, Microsoft is cutting some licensing costs for larger companies. A good move for them as the economy slows.
In a previous blog post on Detecting When a Login Has Implicit Access to a Database, I mentioned that having CONTROL SERVER rights means having implicit rights into the databases. Robert Davis posted a comment asking if there was a difference with respect to explicit permissions between being a member of the sysadmin fixed server role and having CONTROL SERVER rights.
By Steve Jones
This was Redgate in 2010, spread across the globe. First the EU/US Here’s Asia...
By John
Today is Christmas and while I do not expect anybody to actual be reading...
By Bert Wagner
Until recently, my family's 90,000+ photos have been hidden away in the depths of...
Comments posted to this topic are about the item UNISTR Escape
Comments posted to this topic are about the item Celebrating Tomorrow
Comments posted to this topic are about the item SQL Art: I Made a...
In SQL Server 2025, I run this command:
SELECT UNISTR('*3041*308A*304C\3068 and good night', '*') as "A Classic";
What is returned? (assume the database has an appropriate collation)
A:
B:
C:
See possible answers