Fixing SysDepends
Have you been burned by sysdepends at some point in your SQL Server DBA career? Steve Jones has many times, but a FREE new utility ends all that.
Have you been burned by sysdepends at some point in your SQL Server DBA career? Steve Jones has many times, but a FREE new utility ends all that.
How many of you using SQL Server 2000 have the need to send email from SQL Server? How many of you hate Outlook? Here is a software package that can send not only HTML, but PDF as well and through SMTP. Read Hugh Scott's review and thoughts on this product.
Tried at TechEd and manned by the SQLServerCentral.com crew, this was a great idea. It's going to be at PASS and hosted by James Luetkehoelter.
Query Analyzer has been a great tool in SQL Server 2000 and while it is superceeded in SQL Server 2005, lots of us will be using it for some time to come. New author Yakov Shlafman brings us some references and tricks for this essential DBA tool.
It is just next week that the PASS 2005 Summit kicks off and we've got some information about our casino party for those attending.
There has been a lot of interest in the web-facing community lately about a new useability feature that goes by a number of different names—XMLHTTP, AJAX, out-of-band requests, and asynchronous client script callbacks, to name a few.
Regardless of the name, this feature provides a way for a standard web page to make calls back to the server, without a traditional page refresh. The user is oblivious to the fact that a server call has occurred, and is not interrupted by it.
In a followup to the recent articles and discussions on interviewing and DBA skills, Sean McCown brings us a new article that looks at one situation that resulted in a rejection. Learn what you might want to work on before your next interview.
n this lesson, we will examine another function / property in the MDX toolset, the .UniqueName function. The general purpose of the .UniqueName function is to return the Unique Name of the object to which it is appended. .UniqueName can be used in conjunction with hierarchies, dimensions, levels, and members, in a manner similar to the .Name function that we examined in String Functions: The .Name Function, and, also like .Name, .UniqueName can be useful in a host of different applications.
In order for a transaction to meet the requirements of ACID, locks are employed to insure data integrity and multi-user access. The scope, or number of rows held by a lock, is referred to as Lock Granularity. This month, we will begin by introducing several different types of lock modes employed by MS SQL.
Less than two weeks away, sessions tried and tested at the PDC, the Microsoft SQL Server development team and gambling with SQLServerCentral.com! Register today!
By Chris Yates
A brief introduction to the tool and its advantages for database migrations DevOps is...
In a previous blog post we went through how to build a Docker container...
Businesses are drowning in data, but starving for insights. That's where SQL experts swoop...
I'm only processing 50,000 records not everything from the Table where there are 250,00...
Comments posted to this topic are about the item The Marked Transaction
Comments posted to this topic are about the item What happens when we drop...
I want to mark a transaction in the log as a recovery point. How do I do this in my code if I use the transaction, myTran?
See possible answers