2004-02-10
1,868 reads
2004-02-10
1,868 reads
2004-02-06
2,046 reads
2004-02-04
1,745 reads
2004-02-02
1,504 reads
2004-01-30
1,616 reads
In part one Chris Kempster covered a variety of security recommendations primarily for production systems. In Part two of this series he continues to explore security at a variety of levels where you may not realize you are vulnerable.
2019-10-04 (first published: 2004-01-30)
35,418 reads
2004-01-27
1,810 reads
Andy continues writing about replication, this week discussing the many options available when creating a snapshot publication. As we noted on his last article, this one may take longer than usual to load due the large number of images but we think the readability of having it all one page is worth while.
2004-01-27
12,807 reads
2004-01-22
1,862 reads
2004-01-21
2,074 reads
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
By Steve Jones
I had an idea for an animated view of a sales tool, and started...
Comments posted to this topic are about the item Optimism Without Illusion or Why...
Hi all, I'm trying to do classic scenario for loading multiple Excel files into...
Hi So the case statement is slowing this down - but for the life...
In SQL Server 2025, what is returned by this code:
SELECT EDIT_DISTANCE('tim', 'tom')
Assume preview features are enabled. See possible answers