The SQL Server Tables and Exchange Web Services sample demonstrates a powerful integration of Microsoft® Exchange Server 2007 and Microsoft SQL Server™ 2005 features. This integration enables you to provide data from both Microsoft Exchange and SQL Server to client applications so that the data appears as if it were stored in SQL Server. As you will see, this creates some exciting development scenarios.
SQL Server 2000 trace flags can dramatically alter the behavior and functionality of the server. There are a number of ways that they can be enabled and Chris Hedgate brings us a tutorial on their use and benefits.
With the next version of SQL Server due to release in 2008, Steve Jones takes a look of some of the more interesting features available in the June 2007 CTP and that should be ready for release next year.
One thing that people typically want to do is always execute a particular task regardless of whether a checkpoint file exists or not. In this video, Jamie shows you how to create a package that can conditionally skip a checkpoint if it's in place.
Red Gate is looking to expand upon their ever-growing list of extremely helpful tools and asking for help from you DBAs out the real world. They have a survey with 20 questions on Security Tools and 5 people will be chosen to win a goodie bag. I have no idea what's in the bag, but it should be interesting.
It's coming to Denver in September and there's still time to save. And attend the SQLServerCentral.com Reception.
One of new features in SQL 2005 that I haven't seen much talk about is that you can now add aggregate functions to any SELECT (even without a GROUP BY clause) by specifying an OVER() partition for each function. Unfortunately, it isn't especially powerful, and you can't do running totals with it, but it does help you make your code a little shorter and in many cases it might be just what you need.
As I built out the last pieces of the original table set (Card, Vendor, and Purchase), I found a number of pieces that needed to be fixed in the design.
In this column, I discuss how SMO can be used to examine a database’s objects and to perform a variety of administrative tasks.
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
Comments posted to this topic are about the item An SSIS Upgrade
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers