Identifying Unused Objects in a Database
Longtime author Leo Peysakhovich answers one of the most common questions seen in discussion areas around the world: how do you identify unused objects?
Longtime author Leo Peysakhovich answers one of the most common questions seen in discussion areas around the world: how do you identify unused objects?
After concluding a broad overview of various aspects of SQL Server 2005 Integration Services, part 32 of this series focuses on individual components that have more specialized, but very useful characteristics, starting by discussing the Message Queue Control Flow task, and following with coverage of a number of Data Flow transformations.
The next meeting of the Detroit Area SQL Server User Group is September 14th.
Everyone wants to get ahead of the curve with SQL Server 2005, but many people don't have the time or desire to dig through a Google search. Steve Jones has gotten quite a few requests for resources, so here is a compiled list of some places that might help you get started.
Learn how to use ALERTs, a SQL Agent job and a stored procedure (SP) to create a copy of your critical database backups on another physical machine as soon as the database backups are created.
This article is a short summary of Windows utilities both GUI and command line intended for new SQL Server DBAs or those interested in learning some useful techniques.
A CTE is a "temporary result set" that exists only within the scope of a single SQL statement. It allows access to functionality within that single SQL statement that was previously only available through use of functions, temp tables, cursors, and so on.
Have you ever needed to build a job that could run within a certain period of time? Those long maintenance operations, like index rebuilds, need to fit within certain windows of time. New author Joe Doherty brings us a great technique for ensuring those jobs do not run over into your business day and impact normal operations.
Are you interested in a raise? Asif Sayed got one from a well written report. This time he brings us a beginners' looks at Reporting Services 2005 using a smart client for testing.
Microsoft IT developed strategies to reduce the duplication of sensitive data and improve the security of personally identifiable information in the Microsoft IT LOB application space. These strategies are based on the new security features and functionalities that Microsoft® SQL Server™ 2005 includes.
By alevyinroc
Ten years (and a couple jobs) ago, I wrote about naming default constraints to...
By Steve Jones
We have multiple teams (8) working on Redgate Monitor. Some work on the Standard...
By HeyMo0sh
Learning any kind of theory is easy, but adapting FinOps and watching it rescue...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item The Problem Isn't Always Your...
Comments posted to this topic are about the item Identity Defaults
What happens when I run this code?
CREATE TABLE dbo.IdentityTest
(
id int IDENTITY(10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
See possible answers