Managing Jobs Using TSQL
We've had a good run of jobs about job management lately, Randy sent us another one that looks at the job of job management and shows us how he tackled the problem.
We've had a good run of jobs about job management lately, Randy sent us another one that looks at the job of job management and shows us how he tackled the problem.
Join SQLServerCentral.com co-founder Brian Knight for this free webcast on SQL Server security best practices. In this session on Technet, we will look at how to protect your system from internal and external security factors. We will look at the types of permissions in your database objects, implementing column and row-level security, and protecting yourself from SQL Injection attacks. We'll also cover best practices for basic and advanced protection for your SQL Server system.
It is always better to be proactive than reactive, when it comes to identifying and eliminating SQL Server performance issues. This article shows you how to analyze the data gathered by Profiler, to identify the performance issues. This article also provides four generic stored procedures for analyzing Profiler output.
Not even worth talking about, right? Probably, but they still exist. Read about this worst practice and pass it along.
Quite a while back Andy wrote an article about why not using primary keys and clustered indexes was a worst practice. Chris weighs in this week with a great article that gives some more in depth info on clustered indexes and why he thinks they should be used on every table.
Andy recently implemented a SAN and shares some of the info he picked up during the purchase and implementation. This article also discusses briefly the differences between SAN and NAS, and has some links to other sites for more info as well.
Join SQLServerCentral.com co-founder for this free webcast on SQL Server security best practices. In this session, we will look at how to protect your system from internal and external security factors. We will look at the types of permissions in your database objects, implementing column and row-level security, and protecting yourself from SQL Injection attacks. We'll also cover best practices for basic and advanced protection for your SQL Server system.
MCSD's who certified using Visual Studio 6 are eligible to receive a free exam voucher for the 70-300 exam. You must register for the voucher and take the exam before Sep 30, 2003. Follow the link or visit the MCP secure site directly to register. It takes about a minute and you'll receive a code to prevent to your test vendor when you schedule the exam. Thanks, Microsoft!
Brian Knight recently had the basic need to retrieve a record from the database at random. What seemed to be an easy task quickly became a complex one. This case showed an interesting quirk with T-SQL that was resolved in an equally quirky way. This quick article shows you a method to retrieve random data or randomize the display of data.
Chris Kempster (frequent contributor to the site) has released an ebook titled SQL Server 2000 for the Oracle DBA. The press release contains a brief overview of the book plus links to several reviews. Priced at $20 per copy, not bad at all!
By Brian Kelley
In information security (INFOSEC), there several foundational concepts and principles. One of the ones...
By Steve Jones
the standard blues– n. the dispiriting awareness that the twists and turns of your...
By Chris Yates
A brief introduction to the tool and its advantages for database migrations DevOps is...
I'm tracing activity on one database and would like to include the client_app_name in...
select Custno, Addr1, City, Res_Phone, Bus_Phone, Fax_Phone, Marine_Phone, Pager_Phone, Other_Phone, email1, email2 from customer...
I'm only processing 50,000 records not everything from the Table where there are 250,00...
I want to mark a transaction in the log as a recovery point. How do I do this in my code if I use the transaction, myTran?
See possible answers