Converting Shaped Recordsets into XML
This article shows you how to take a shaped recordset and convert the results into XML all while preserving the shaped recordset hierarchy.
This article shows you how to take a shaped recordset and convert the results into XML all while preserving the shaped recordset hierarchy.
The behavior of SQL Server is influenced in many ways by the various settings and options available. This series will examine some of the ANSI options that can be set and changed in SQL Server.
Get a sneak peak of some of the sections from Start to Finish Guide to SQL Server Performance Monitor. Find out what counters to watch and what their thresholds are.
This article explains how orphan users get created, and provides you with troubleshooting information. A bonus stored procedure called ShowOrphanUsers is included, that goes and searches all the databases and generates a complete list of orphan users.
In this article Andy looks at one way you can separate your presentation code from your data when you generate HTML tables for simple reports. Lots of code examples so you can see how it works.
This article shows you how to design the storage for email addresses, how to validate email addresses, how to retrieve demographic information from email addresses efficiently, using computed columns and indexes. It also covers the security aspect of dealing with email addresses.
A look at a new security tool from Microsoft for analyzing your SQL (and other) servers.
Certy.com has just released SQL Server 2000 certifications. These certifications are 100% free and a must for any DB developer & DBA.
The strength and holy grail of relational databases lies in the very name: relations. Microsoft has put a good deal of intelligence and cunning into query optimizations, caching, indexing and execution plans to make the process of finding related records even smoother and faster. This small article, however, will try to shatter the very sacred notion of relational databases.
Microsoft has released a patch to fix two buffer overflow vulnerabilities in SQL Server 2000. No UserID or password is required by the attacker to exploit these issues. The problem is exacerbated by the fact the attack goes over UDP.
In last months one of the scenarios where you can use AI has been...
By ChrisJenkins
Do you spend so long manipulating your data into something vaguely useful that you...
By Steve Jones
It was neat to stumble on this in the book, a piece by me,...
Comments posted to this topic are about the item Backup to Immutable Storage
Comments posted to this topic are about the item Microsoft Security Changes and SQL...
Comments posted to this topic are about the item Expanding into Print
In SQL Server 2025, a backup can be made on Azure Immutable Storage. What changes in how the backup is created?
See possible answers