Articles

Technical Article

Building a 24 x 7 Database

Over the last few years, corporations have invested billions of dollars to integrate the automations of core business systems in large ERP applications. This paper looks at the risk of downtime and solutions for building an around-the-clock database.

2004-11-24

2,129 reads

SQLServerCentral Article

SQL MAIL Using POP3 and SMTP

SQL Server has a great build in messaging system with SQLMail. Unfortunately it requires Outlook and Exchange to work properly. Some people don't like this or do not run Exchange and have issues getting it to work. Gregory Larsen takes a look at how you can use SMTP to send email from SQL Server.

You rated this post out of 5. Change rating

2004-11-23

21,118 reads

Technical Article

Updating Data in Linked Servers, Information Schema Views, and More

E
very day a developer somewhere needs to write code to iterate through SQL Server™ system objects, query and update tables in linked servers, handle optimistic concurrency, and retrieve column and stored procedure metadata. In this month's column, I will address these and other T-SQL development scenarios based on some of the questions I most frequently receive from readers.

2004-11-23

1,686 reads

Technical Article

Writing Secure Transact-SQL

There are plenty of good sources of information about how to deploy SQL Server in a secure fashion. However, these resources are often targeted at database administrators tasked with securing already developed applications. In addition, there is a rich body of information that discusses writing secure .NET and ASP.NET code, including .NET code that accesses SQL Server. However, many of these resources focus on the data access code that runs on the application servers rather than the Transact-SQL (T-SQL) code that executes within SQL Server. Developing T-SQL code that runs securely on SQL Server is the primary focus of this column.

2004-11-22

2,400 reads

SQLServerCentral Article

Tracking Down Newly Created Databases

SQL Server was designed to make the DBA job easier, distribution of security, automated procedures, etc. But in some areas it either does not go far enough, or a feature is used for an unintended purpose. One of those areas comes into play when allowing many people to create databases. Author Eli Leiba brings us a tecehnique he uses to close the gap and track down those newly created databases.

You rated this post out of 5. Change rating

2004-11-18

4,957 reads

Blogs

Deployment Pipelines in Fabric – What Are They?

By

In the realm of software development and content creation, the deployment pipeline serves as...

Ad Hoc SQL Server Help

By

I just need a few hours of your time… We get a variation of...

TempDB Internals – What’s New (SQL Server 2016 to 2022)

By

I wrote about TempDB Internals and understand that Tempdb plays very important role on...

Read the latest Blogs

Forums

A Quick Restore

By Steve Jones - SSC Editor

Comments posted to this topic are about the item A Quick Restore

Guarding Against SQL Injection at the Database Layer (SQL Server)

By Terry Jago

Comments posted to this topic are about the item Guarding Against SQL Injection at...

Ola Hallengren Index Optimize Maintenance can we have data compression = page

By JSB_89

I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...

Visit the forum

Question of the Day

A Quick Restore

While doing some testing of an application, I wanted to reset my environment after doing some testing with this code:

USE DNRTest

BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak'
GO
/*
Bunch of stuff tested here
*/RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACE
What happens if this runs, assuming the "bunch of stuff" isn't anything affecting the instance.

See possible answers