SQL Server 2005 Distilled
A new book from a former SQL Server team member looking at 2005. Read the sample chapter.
A new book from a former SQL Server team member looking at 2005. Read the sample chapter.
It's been 5 years that this community has been live and Steve Jones takes a short look back at the community as well as announcing a few prizes.
Miguel De Icaza has been a major mover of Mono, the open-source framework for .NET since the get-go. These days he shepherds Mono along from within Novell Inc. At Novell's BrainShare conference, he discussed the latest doings with writer Paul Ferrill.
SQL Server allows multiple triggers on a table, but the order in which they are executed can sometimes cause problems. Author Dinesh Asanka brings us a technique for managing the order of execution for your triggers.
It seems that there is both excitement and confusion surrounding Master Pages and Themes. A big part of the problem is that they always seem to be mentioned in the same breath – like I just did. The reality is that they are two separate but equally important technologies. Each has its own function in ASP.NET but when you use these two technologies together, you get a site design that is amazingly versatile, easy-to-use, and easy-to-adapt. ASP.NET 2.0 provides a whole host of improvements to your web development experience but, in my opinion, these two technologies represent the single biggest reason to migrate your sites to this new platform. Let's take a look at each of these technologies in turn.
The report models introduced in SQL Server 2005 feature a number of ways to customize the data visible to different users and groups: perspectives, model item security, security filters, and opaque expressions. This article describes when and how to use each of these features.
One of the big changes with SQL Server 2005 is the evolution of SQL-DMO to the new SMO managed code assemblies. Author Raj Vasant brings us quite a bit of code to show how this can be used to script your objects.
Will multiple processors or a dual core processor be beneficial to you, and what are the differences between them? These are the questions this article will attempt to lay to rest.
Do you use identity values? Do missing values ever cause problems? Maybe you need to look for missing invoices? Stephen Lasham brings us a technique for finding those missing values in a sequence.
In this article I will show you how you can implement security on a WCF service. There are many options and extensibility points for implementing security in WCF. You can also use specific products, such as the Windows 2003 Server Authorization Manager, together with WCF to implement the authorization requirements of a solution. Out of the box, WCF supports Windows credentials, Username Tokens and X.509 Digital Certificates as security credentials.
By Steve Jones
anderance – n. the awareness that your partner perceives the relationship from a totally...
By gbargsley
We’ve all been there. Someone walks up and asks, “Is SQL Server having issues?”...
By Chris Yates
In the beginning, there was OLTP – Online Transaction Processing. Fast, reliable, and ruthlessly...
Hello Everyone! My organization is looking to implement a solution in SQL Server (2019...
Nguyen Khanh Tung Email: traiphieu.com@gmail.com ORCID: 0009-0002-9877-4137 -------------------------------------------------------------------------------- Abstract This article presents a numerical...
True or False: Tables with a SPARSE column consume more space than regular columns if most values are NOT NULL.
See possible answers