Pop Rivett's SQL Server FAQ No.5: Pop on the Audit Trail
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
Among the most common tasks that have not yet been discussed in this series is the Send Mail task, which will be the topic of this article.
With a new name, new capabilities, and a new focus, the product formerly called SQL Server Mobile Edition expands its reach to small-footprint desktop applicationsand it's free!
In response to an editorial on eliminating tape in favor of disk backups, new author Tim OPry brings us a look at his environment and the process by which they eliminated the need for tape in their backup scheme while maintaining a well thought out disaster plan.
It's nice to have little amenities in your development tools. They make for easier development and can save you a little time. Synonyms is one of those tools.
Part 3 of Vincent Rainardi's data warehousing series looks at some of the situations and challenges of loading a fact table in a data warehouse.
In response to a number of suggestions, we have setup new forums where you can ask and comment about the various third party products that you use with SQL Server.
Security has become more and more important in today's business environment. From the database point of view, DBAs and system administrators need an improved security model. SQL Server 2005 provides an improved security feature. It is claimed that SQL Server 2005 is secure by default. In SQL Server 2005, the security model is divided into three areas namely authentication, authorization, and encryption.
As a DBA, you can find very useful information in the Windows event logs. About important events, the health of your SQL Server and the operating system it runs on. Unfortunately, the logs also contain a lot of useless information. Some applications have a tendency to log hundreds of events every day, filling up the logs very quickly with info that you, as a DBA, do not need. But you still need to see that important message that informs you the server is going to crash if you don’t take action.
Utilizing design patterns with SQL Server 2005 Service Broker enables you to assess and select appropriate solutions for all of your SQL Server 2005 asynchronous messaging needs.
By Steve Jones
A customer was testing Redgate Data Modeler and complained that it auto-generated PK names....
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
I have this data in a SQL Server 2025 table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers