Beware to the System Generated Constraint Name
New columnist Gregory Larsen used to not care what his objects were called until recently when he began to become concerned with the system generated constraint names. This short article tells you why.
New columnist Gregory Larsen used to not care what his objects were called until recently when he began to become concerned with the system generated constraint names. This short article tells you why.
This article briefly discusses SQL Server's data and procedure cache and shows you the common Transact-SQL statements/command and system tables that you can use to interact with the cache through Transact-SQL.
Microsoft is now accepting nominations for beta testers for SQL Server 2000 (64-bit), SQL Server 2000 Windows® CE Edition (SQL Server CE) version 2.0, and SQL Server 2000 Service Pack 3 (SP3). Any SQL Server customer can participate.
Bill Wunder has done it again with his newest release of his DDL Archive Utility, which can pull entire schemas into Source Safe automatically.
Recently Steve Jones noticed that someone wanted to use a UDF to enforce uniqueness. No big deal, right? Well this person wanted to enforce uniqueness based on some other column value. A bit of a challenge, but this article presents a couple ways to handle this.
This article introduces TSQLDoc, a Windows Script Host script that extracts procedure metadata and embedded documentation comments from Transact-SQL stored procedures, generates XML documentation for every stored procedure in a database and optionally transforms the XML document into HTML or other format using XSLT.
This article shows you how to take a shaped recordset and convert the results into XML all while preserving the shaped recordset hierarchy.
The behavior of SQL Server is influenced in many ways by the various settings and options available. This series will examine some of the ANSI options that can be set and changed in SQL Server.
Get a sneak peak of some of the sections from Start to Finish Guide to SQL Server Performance Monitor. Find out what counters to watch and what their thresholds are.
This article explains how orphan users get created, and provides you with troubleshooting information. A bonus stored procedure called ShowOrphanUsers is included, that goes and searches all the databases and generates a complete list of orphan users.
By Zikato
TSQL ScriptDOM is a useful library for parsing scripts into an abstract syntax tree....
By DataOnWheels
Over the past few months, I have debated starting a new blog to discuss...
By Steve Jones
It’s that time of the month again, and once again, I’m late and I’m...
Comments posted to this topic are about the item Do You Really Need HA?
Comments posted to this topic are about the item The New Database CheckDB
Comments posted to this topic are about the item MySQL’s BLACKHOLE Storage Engine: The...
I run this code:
create database experiment
go
use Experiment
go
select DATABASEPROPERTYEX('Experiment', 'LastGoodCheckDbTime')
What is returned? See possible answers