Converting Shaped Recordsets into XML
This article shows you how to take a shaped recordset and convert the results into XML all while preserving the shaped recordset hierarchy.
This article shows you how to take a shaped recordset and convert the results into XML all while preserving the shaped recordset hierarchy.
The behavior of SQL Server is influenced in many ways by the various settings and options available. This series will examine some of the ANSI options that can be set and changed in SQL Server.
Get a sneak peak of some of the sections from Start to Finish Guide to SQL Server Performance Monitor. Find out what counters to watch and what their thresholds are.
This article explains how orphan users get created, and provides you with troubleshooting information. A bonus stored procedure called ShowOrphanUsers is included, that goes and searches all the databases and generates a complete list of orphan users.
In this article Andy looks at one way you can separate your presentation code from your data when you generate HTML tables for simple reports. Lots of code examples so you can see how it works.
This article shows you how to design the storage for email addresses, how to validate email addresses, how to retrieve demographic information from email addresses efficiently, using computed columns and indexes. It also covers the security aspect of dealing with email addresses.
A look at a new security tool from Microsoft for analyzing your SQL (and other) servers.
Certy.com has just released SQL Server 2000 certifications. These certifications are 100% free and a must for any DB developer & DBA.
The strength and holy grail of relational databases lies in the very name: relations. Microsoft has put a good deal of intelligence and cunning into query optimizations, caching, indexing and execution plans to make the process of finding related records even smoother and faster. This small article, however, will try to shatter the very sacred notion of relational databases.
Microsoft has released a patch to fix two buffer overflow vulnerabilities in SQL Server 2000. No UserID or password is required by the attacker to exploit these issues. The problem is exacerbated by the fact the attack goes over UDP.
By Steve Jones
I have been experimenting a bit with graph databases, trying to learn more about...
By Steve Jones
Thanks to everyone who attended my talk at VS Live Las Vegas 2023 on...
By Steve Jones
I delivered my talk on Architecting Zero Downtime Deployments yesterday at VS Live Las...
Comments posted to this topic are about the item How to Connect SQL Server...
Comments posted to this topic are about the item Adjusting DOP based on Feedback
Comments posted to this topic are about the item How Important is Zero Downtime?