Additional Articles


Technical Article

SQL Server 2000 SP3 and xp_cmdshell Woes

The problems caused by the SQL Sapphire Worm, also know as the SQL Slammer, have caused many sites to do a quick upgrade to SQL Server 2000 Service Pack 3 (SP3). It includes the fix that prevents infection by the worm. While moving to the latest service pack is usually a good thing, to do so without thorough testing risks breaking a working application. That is exactly what happened to one of my clients over the weekend.

2005-11-02

2,068 reads

Technical Article

Loving to Hate the Data Administrator

You can just hear it now: At the table down the hall, there’s a group of people having, (as it seems to you) yet another academic discussion on the merits of third-normal form and the structure of primary keys. You’ve heard many discussions like this before — it all seems so pointless. After all, doesn’t it just boil down to “create table” commands and a bunch of DDL? You mastered all that in your first DBA class. What could be so hard?

2005-10-31

3,688 reads

Technical Article

Accurate Numeric Identifiers: Using Verhoeff's Method for Check Digits

Check digits–not to be confused with checksums–are often added to numeric identifiers such as customer and product numbers to reduce the chance of incorrect entries. Sequences of numbers are notoriously easy to mistype, and constraints alone generally won't do the job. In this excellent article, Lynn Fields shows you how to implement the "Cadillac" of check digit methods–the Verhoeff Dihedral Group.

2005-10-26

2,735 reads

External Article

High Call Volume SQL Server Applications on NUMA Systems

One of the most difficult database operations to scale-up on high-end server systems is the network call. In fact, without special precautions, a high call volume database application can have severe negative scaling on large systems. It is suspected that this problem is more pronounced on NUMA systems than basic SMP systems. A NUMA system with 16 processors can have significantly lower throughput capability than an otherwise comparable 4-way SMP system.

2005-10-25

1,754 reads

Technical Article

VIEWS: The Key to Database Agility

There is an important technique for creating truly agile databases that I haven’t seen in his writings; one which is well-known to DBAs, but little understood in the application development community – the use of database views to create a layer of abstraction between the normalized relational tables and the applications that use the data.

2005-10-21

3,736 reads

Technical Article

The Steps to monitoring greatness

SQL Server Profiler can correlate Microsoft Windows System Monitor (Performance Monitor in Windows NT 4.0) counters with SQL Server or SQL Server 2005 Analysis Services (SSAS) events. Windows System Monitor logs system activity for specified counters in performance logs. The first thing to remember is in order to have correlating information you need to obviously be in sync - in other words you must start the perfmon trace and profiler trace at the same time or else they won't match up.

2005-10-19

2,508 reads

External Article

Database Geek of the Week - Gary Mallow

Database geeks are all around us. I met Gary Mallow on the email list of a cycling group run by a local church. After some conversation, I discovered that he is a director of a group of developers who build applications, sometimes using .NET and often using Oracle as a database. Like me, Gary is not entirely comfortable with his ability as a UI developer, and so finds database work a good fit.

2005-10-18

1,689 reads

External Article

Controlling Transactions and Locks in SQL 2000 and 2005 - Part 3

In the preceding articles of this series, Lock Granularity, Transactions, and ACID were introduced. Common lock types, such as Shared, Exclusive, and Update were explored, as well as using SP_Lock to obtain current system lock information. In this article, the normal internal SQL locking methods will be manipulated using Lock Hints in order to obtain finer lock control.

2005-10-14

4,123 reads

Blogs

Monday Monitor Tips: AI Query Analysis

By

AI is everywhere. It’s in the news, it’s being added to every product, management...

AI: Blog a Day – Day 8: RAG – Retrieval Augmented Generation

By

RAG — Retrieval Augmented Generation. we have covered so far — embeddings, vectors, vector...

AI: Blog a Day – Day 7: Vector and Vector Databases

By

Continuing from Day 6 we learned Embeddings, Semantic Search and Checks, on Day 7...

Read the latest Blogs

Forums

would it be so terrible to install ssms on a few user desktops?

By stan

Hi, ssms is free here.   I can think of other reasons to do this...

I'm thinking about submitting some articles

By Doctor Who 2

I've written some documentation on using different Markdown types of files on GitHub. It's...

Not Just an Upgrade

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Not Just an Upgrade

Visit the forum

Question of the Day

Restoring On Top I

I am doing development work on a database and want to keep a backup so I can reset my database. I make some changes and want to restore over top of my changes. When I run this code, what happens?

USE Master
BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak'
GO

USE DNRTest
GO
CREATE TABLE MyTest(myid INT)
GO
USE master
RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACE

See possible answers