SQL Server 2005 - Interface Overview
In this article, we will be giving you an overview of what the new interface looks like in SQL Server 2005.
2005-02-07
2,762 reads
In this article, we will be giving you an overview of what the new interface looks like in SQL Server 2005.
2005-02-07
2,762 reads
TRY-CATCH blocks in T-SQL allow error detection and reporting in a construct similar to that used in VB .NET, C#, and C++. The specific focus here is how TRY-CATCH blocks are used in stored procedures and where there might be some surprises.
2005-02-04
2,889 reads
Venkat Prasad discusses some programming techniques for saving XML data from Microsoft SQL Servers, Web Servers, XML Web Services, and Microsoft SQL Reporting Servers. Topics include a comparison of traditional techniques used for saving XML streams, using ASP/ASPX and COM, with newer ones using .NET Framework Classes—datasets, XMLTextReaders and XMLTextWriters, XSLTransformation, saving data from SQL Reporting Servers, and uploading XML back to SQL Server. (15 printed pages).
2005-02-03
1,305 reads
Every organization has a system of weekly reboots or monthly reboots etc., for all their servers. When it comes to clustered servers, the reboot cycle would be little different. Usually the active node in the cluster will always be active, unless there is a failover initiated manually or when there is a hardware failure etc.
In this article, I am going to explain how to reboot cluster nodes.
2005-02-03
2,894 reads
In this article, we continue our discussion on high availability and scalability enhancements in SQL Server 2005 Beta 2 release. Features such as clustering, database mirroring, online indexing, fast recovery, database snapshots, and snapshot isolation transaction level have already been covered earlier in this series - now we will concentrate on the remaining features, such as a new method of table and index partitioning, backup and restore improvements, and new hardware support options.
2005-02-02
1,738 reads
Business intelligence is awash in so many products, buzzwords and technologies that it is often hard to see the forest for the trees. It is at times like this that I put on my industry analyst's cap and muse, "Hmm, what is this: manage, monitor or model?" This tripartite way of looking at the world has served my clients well, and I thought I'd pass it along.
2005-02-02
2,090 reads
General optimization of RS' performance is, beyond argument, one of the more important functions of the Administrator. In evaluating performance from various perspectives at the Administrative level, one readily useful source of information is the data we can obtain from the logs created by the system itself. Reporting Services generates a number of log files to capture information about server operations, status, and so forth. Within this group of logs, which we will explore individually within prospective articles within our series, the Report Server Execution Log is a great place to start in setting up a basic performance and auditing analysis capability.
2005-02-01
2,827 reads
In this installment of our series covering new and improved functionality of SQL Server 2005 Beta 2, we will focus on the topic of security, which has been becoming increasingly prominent among the issues on every database and system administrator's agenda. A new approach to software development started with the Trustworthy Computing initiative launched in early 2002, necessitated by the growing number of exploits directed at the Microsoft operating system and applications, resulted in a "secure by default" product with highly customizable security features further increasing the degree of protection. We will start with the features related to authentication (the process of identifying logins connecting to the SQL Server and users accessing databases), and continue with authorization (determining the level of permissions granted once the initial connection is established) and encryption in the future articles. In particular, we will cover here, password policy implementation and management as
2005-02-01
5,709 reads
This paper explains how batches are cached and reused in SQL Server 2005, and suggests best practices on maximizing reuse of cached plans. It also explains scenarios in which batches are recompiled, and gives best practices for reducing or eliminating unnecessary recompilations.
2005-01-31
1,234 reads
Many Enterprises create and maintain applications that reside on "IBM Lotus Domino Server." Since the Lotus Domino server has the capability of handling applications and messaging, it has become a prime requirement for a SQL Server DBA to cross- reference data or import and export data to and from the Domino database and SQL Server databases. In this article, I am going to discuss how to use SQL Server Linked server to connect to databases that reside on the Lotus Domino server. The steps involved in connecting to the Lotus notes mail server database can be used for connecting to other databases that reside in "Lotus Notes Domino" server.
2005-01-31
2,430 reads
By Steve Jones
This is my last week of the year working (I guess I come back...
By Steve Jones
suente– n. the state of being so familiar with someone that you can be...
Anyone (everyone?) who has ever tried to learn a programming language knows that to...
I am getting the below error when I execute a SQL command in SQL...
I am getting the below error when I execute a SQL command in SQL...
Hi everyone. I have this table and this information. (left side of the image)...