A Look at SQL Log Rescue
In another look at log tools, author S. Srivathsani looks at SQL Log Rescue from Red Gate Software. Read on about how to setup this tool in your environment and use it for a peek inside your transaction log.
In another look at log tools, author S. Srivathsani looks at SQL Log Rescue from Red Gate Software. Read on about how to setup this tool in your environment and use it for a peek inside your transaction log.
As we begin a migration to a new hosting facility, we'll keep you informed. The first step is an email migration.
Grant Fritchey steps into the workbench arena, with an example-fuelled examination of catching and gracefully handling errors in SQL 2000 and 2005, including worked examples of the new TRY..CATCH capabilities.
Reading the transaction log is challenging and one of the tools that enables you go get insight is ApexSQL Log. New author S. Srivathsani takes a look at this tool and how it worked in one environment.
In this article, Brian looks at how Citrix MetaFrame can use SQL Server for its internal data repository. The basic operation of SQL Server in a Citrix MetaFrame installation is covered. In addition, Brian looks at how a DBA is an integral part of the support team for a successful Citrix MetaFrame farm.
Before you even begin building a SQL Server 2005 cluster, you must ensure that your network infrastructure is in place. Here's a checklist of everything that is required before you begin installing a SQL Server 2005 cluster.
If your organization is like many organizations, it may have some older version SQL Server clusters in production. If so, at some point you will have to make a choice about how to upgrade them to SQL Server 2005.
The depths of the storage engine must be some interesting places and we dive a little into them with our look at Santeri Voutilainen, one of the very talented SQL Server engineers who worked on the lock manager.
If you are near Rhode Island, there's a new user group available with SQL Server Guru Grant Fritchey presenting.
In most relational database implementations. Update and Delete commands destroy the data that was there prior to their issue. However, some systems require that no information is ever physically deleted from or updated in the database. In this article, Arthur Fuller presents a solution to this requirement in the form of a Point-in-Time architecture: a database design which allows a user to recreate an image of the database as it existed at any previous point in time, without destroying the current image.
By HeyMo0sh
Microsoft Fabric (not to be confused with the more general term “fabric” in DevOps)...
By James Serra
I’m honored to be hosting T-SQL Tuesday — edition #192. For those who may...
By Vinay Thakur
Continuing from Day 2 , we learned introduction on Generative AI and Agentic AI,...
hi everyone I am not sure how to write the query that will produce...
Comments posted to this topic are about the item Rollback vs. Roll Forward
Comments posted to this topic are about the item Foreign Keys - Foes or...
I have some data in a table:
CREATE TABLE #test_data
(
id INT PRIMARY KEY,
name VARCHAR(100),
birth_date DATE
);
-- Step 2: Insert rows
INSERT INTO #test_data
VALUES
(1, 'Olivia', '2025-01-05'),
(2, 'Emma', '2025-03-02'),
(3, 'Liam', '2025-11-15'),
(4, 'Noah', '2025-12-22');
If I run this query, how many rows are returned?
SELECT *
FROM OPENJSON(
(
SELECT t.* FROM #test_data AS t FOR JSON PATH
)
) t; See possible answers