New Features in SQL Server 2008 Management Studio – Part 2
This article is the final article in a series that explores new features that are available in SQL Server 2008 Management Studio
This article is the final article in a series that explores new features that are available in SQL Server 2008 Management Studio
The previous installment of "SQL Server 2005 Express Edition" discussed Service Broker's internal activation, which allows you to automate communication between initiator and target. Unfortunately, there are some caveats related to its security context. This article describes their specifics and provides a couple of methods to eliminate any undesirable side effects they introduce.
I diverge a little from the typical coding-based/oriented best practice to one that is focused on governance within public or government organisations with respect to the security of the data in databases used for annual reports. Internal controls fall...
Continuing with his discussion of how to implement a date dimension in SQL Server Analysis services, expert warehousing expert Vincent Rainardi discusses how to use this dimension as a reference dimension as well as other advanced topics.
When reviewing an issue through the Replication Monitor, the error messaging was leaving me wanting more detail to find out why the replication process was failing. So my question is, is there a way to garner more information from the replication agents running via SQL Server Agent?
In which Phil illustrates an old trick using STUFF to intert a number of substrings from a table into a string, and explains why the technique might speed up your code...
This article is part 2 of a 4 part series that explores the internals of SQL Server Integration Services. This article looks at SSIS Transformations and Execution Trees.
These days more and more systems gather data all the time, but are we using that data? Steve Jones comments on the glut of information and some of the problems that creates.
These days more and more systems gather data all the time, but are we using that data? Steve Jones comments on the glut of information and some of the problems that creates.
These days more and more systems gather data all the time, but are we using that data? Steve Jones comments on the glut of information and some of the problems that creates.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item Dancing Robot Goes Rogue
Hi , i installed winscp on my pc, added it to GAC thru vs...
Comments posted to this topic are about the item Identities and Sequences II
In thinking about the differences between the identity property and a sequence object, which of these two guarantees that there are consecutive numbers (according to the increment) inserted in a single table?
See possible answers