External Article

SQL Server 2005 Part 5 - High Availability and Scalability Enhancement

In this article, we continue our discussion on high availability and scalability enhancements in SQL Server 2005 Beta 2 release. Features such as clustering, database mirroring, online indexing, fast recovery, database snapshots, and snapshot isolation transaction level have already been covered earlier in this series - now we will concentrate on the remaining features, such as a new method of table and index partitioning, backup and restore improvements, and new hardware support options.

SQLServerCentral Article

Coupling Outlook to SQL Server

SQL Server has drivers to read almost any data source, but they are not always the easiest to work with. New author Kevin Terry spent quite some time learning how he could pull data from Outlook using DTS and scripting. Most information on the internet requires Exchange to be on the same server as SQL Server to get the data, but this solution works with any configuration, and can pull any information, email address, contact information, etc. from Outlook.

External Article

MSSQL Server 2000 Reporting Services: Black Belt Administration: Prepa

General optimization of RS' performance is, beyond argument, one of the more important functions of the Administrator. In evaluating performance from various perspectives at the Administrative level, one readily useful source of information is the data we can obtain from the logs created by the system itself. Reporting Services generates a number of log files to capture information about server operations, status, and so forth. Within this group of logs, which we will explore individually within prospective articles within our series, the Report Server Execution Log is a great place to start in setting up a basic performance and auditing analysis capability.

External Article

SQL Server 2005 Part 1 - Security (Authentication)

In this installment of our series covering new and improved functionality of SQL Server 2005 Beta 2, we will focus on the topic of security, which has been becoming increasingly prominent among the issues on every database and system administrator's agenda. A new approach to software development started with the Trustworthy Computing initiative launched in early 2002, necessitated by the growing number of exploits directed at the Microsoft operating system and applications, resulted in a "secure by default" product with highly customizable security features further increasing the degree of protection. We will start with the features related to authentication (the process of identifying logins connecting to the SQL Server and users accessing databases), and continue with authorization (determining the level of permissions granted once the initial connection is established) and encryption in the future articles. In particular, we will cover here, password policy implementation and management as

External Article

Connect to Lotus Domino using SQL Server Linked Server

Many Enterprises create and maintain applications that reside on "IBM Lotus Domino Server." Since the Lotus Domino server has the capability of handling applications and messaging, it has become a prime requirement for a SQL Server DBA to cross- reference data or import and export data to and from the Domino database and SQL Server databases. In this article, I am going to discuss how to use SQL Server Linked server to connect to databases that reside on the Lotus Domino server. The steps involved in connecting to the Lotus notes mail server database can be used for connecting to other databases that reside in "Lotus Notes Domino" server.

SQLServerCentral Article

How To Configure SQL Mail to Work With Groupwise

SQL Server excels in many areas, including the tight integration of it's internal SQLMail system with Outlook and Exchange. But if you want to use another mail system, SMTP, Lotus Notes, or Groupwise, you are left to your own resources to configure your system. Fortunately new author Chris Shepherd has taken time to dig in and document how to get SQL Server to work with Novell's Groupwise mail system. Read about his setup and troubleshooting tips.

Blogs

Migrating from Azure PG Single Server to Flex with Azure VM and pg_dump/restore

By

This is more complicated than using the Azure Migration method, but because it’s maxed...

PowerShell (and T-SQL) and Elastic Jobs

By

I’ve covered how to create Elastic Jobs in the portal (this one is important...

A New Word: Redesis

By

redesis – n. a feeling of queasiness while offering someone advice, knowing they might...

Read the latest Blogs

Forums

Extended Event Comfort

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Extended Event Comfort

SQL Database Project in Azure Data Studio

By Daniel Calbimonte

Comments posted to this topic are about the item SQL Database Project in Azure...

AG Rules for Databases

By Steve Jones - SSC Editor

Comments posted to this topic are about the item AG Rules for Databases

Visit the forum

Question of the Day

AG Rules for Databases

Which of these is not a requirement for a database to be added to an Availability Group (AG)?

See possible answers