Additional Articles


External Article

Controlling Transactions and Locks in SQL 2000 and 2005 - Part 3

In the preceding articles of this series, Lock Granularity, Transactions, and ACID were introduced. Common lock types, such as Shared, Exclusive, and Update were explored, as well as using SP_Lock to obtain current system lock information. In this article, the normal internal SQL locking methods will be manipulated using Lock Hints in order to obtain finer lock control.

2005-10-14

4,123 reads

External Article

Automatically Running a Process When SQL Server or SQL Agent Starts

Have you ever had a need to run a query or a process as soon as SQL Server starts? Or run some set of tasks when SQL Server Agent Starts? Possibly you want to run a cleanup routine, a copy process or have some task started each time SQL server or SQL Agent is started. Well if this is the case then this article will discuss a couple of options you might consider using to accomplish automatically running your process.

2005-10-13

2,228 reads

External Article

Database Geek of the Week - Itzik Ben-Gan

Itzik Ben-Gan is a writer and mentor in the development community. He writes a monthly column for SQL Server Magazine and co-authored Advanced Transact-SQL for SQL Server 2000 . He is one of the founders of Solid Quality Learning, a global provider of education and solutions for the Microsoft database platform, and serves as its principal mentor.

2005-10-12

2,399 reads

External Article

Auto Logout Users for DB Maintenance

One thing Access developers love about using SQL Server as the back end is that it is easy to do maintenance. I can't tell you how many times I toured around an office, looking for users who had their client open and connected to the data so I could ask them to log out. Too many times, the offender was at lunch or away from their desks, with their desktops locked.

2005-10-11

3,496 reads

Technical Article

Hacker's-eye view of SQL Server

If a hacker sets sights on your SQL Server, there are four primary methods he can use to take control and carry out unauthorized, malicious activity. I will look at each of these: Password compromise, Account compromise, SQL injection, Buffer overflows

2005-10-07

4,718 reads

External Article

MSSQL Server Reporting Services: Mastering OLAP Reporting: Relationall

Throughout this and other of my series, we have examined parameterization and parameter picklist support. While my focus has often been support of picklists using datasets generated through MDX queries against the cube under consideration, I have often found myself in client engagement scenarios where differing reporting requirements, as well as various "exceptions," drive a need to extend picklist support beyond the capabilities of the basic MDX queries that we have examined.

2005-10-05

2,506 reads

Technical Article

Dimensional Modeling 101 - Time vs Date

When most DW designers begin developing a data warehouse, the Time dimension is the first dimension reviewed with the users. There are usually two or three different persectives on what the Time dimension should represent but, for the most part, it will be used for such calculations as Year-to-date Sales, Monthly Inventory Churn, etc. What most users are actually describing is a Date, or Calendar dimension.

2005-10-04

2,698 reads

External Article

Debugging in Visual Studio.NET 2005

Debugging is an important process for any level of programming to ensure programs function as expected. Most productive developer environments provide tools and utilities to assist with the debugging process. Visual Studio.NET 2005 is equipped with a number of debugger visualizers, but users can also create their own based on an individual project.

2005-10-03

2,280 reads

Blogs

Presenting with Visual Studio Code

By

A while back I wrote a quick post on setting up key mappings in...

Advice I Like: In 100 Years

By

In 100 years a lot of what we take to be true now will...

dataMinds Saturday 2026 – Slides

By

At Saturday the 21st of February I’m presenting an introduction to dimensional modelling at...

Read the latest Blogs

Forums

AllocationType as ROW_OVERFLOW_DATA

By inHouseDBA

Hello, I inherited a number of tables with like 20-30 column using nvarchar(256) in...

connections vs apis

By stan

hi , i hear more and more that we have too many connections to...

is it true we cant debug c# scripts in ssis anymore under vs

By stan

Hi, i'm running vs2022.   I'm trying out a c# script that i'd like to...

Visit the forum

Question of the Day

Missing the Jaro Winkler Distance

I upgraded a SQL Server 2019 instance to SQL Server 2025. I wanted to test the fuzzy string search functions. I run this code:

SELECT JARO_WINKLER_DISTANCE('tim', 'tom')
I get this error message:
Msg 195, Level 15, State 10, Line 1 'JARO_WINKLER_DISTANCE' is not a recognized built-in function name.
What is wrong?

See possible answers