Viewing 15 posts - 91 through 105 (of 252 total)
So I did a little bit of poking around and found that the procedure cache is filled with about 70,000 rows with one execution each of the above select query...
March 31, 2013 at 12:37 pm
Would there be a benefit to using forced parameterization if the procedure cache is filled up with hundreds of these plan stubs and not much else?
If I could get the...
March 31, 2013 at 2:56 am
Looking at a few rows of the procedure cache, I see this:
UseCountsRefCountsCacheobjtypeObjtypedbidSQLSTMT
11Compiled Plan StubAdhocNULLSELECT * FROM dbo.REFER WHERE USERID = 186 AND MSGID = 296
11Compiled Plan StubAdhocNULLSELECT * FROM dbo.REFER...
March 31, 2013 at 1:49 am
I changed the advanced settings to optimize for ad hoc workloads and now the cache is much smaller but I don't expect the hit rate to go up since very...
March 30, 2013 at 8:25 pm
As I dig deeper into the trace output, the selects are all under SQL:Batch and the inserts and updates come through RPC exec sp_executesql N'DELETE FROM.......' <p1 value>,<p2 value>
Does that...
March 30, 2013 at 2:07 pm
I have done a lot of reading over the last couple of days and I understand what is going on now.
The table has 35 columns. The developer was using the...
March 12, 2013 at 9:00 am
I think I found the problem.
There was another index out there that included 32 of the 35 columns which it was referencing. That seems like a really big index.
5...
March 11, 2013 at 1:18 pm
Thanks Lowell,
That is definitely an option. Was hoping for a solution that did not require to make a deny for each user and login and then have to remember to...
February 7, 2013 at 2:24 pm
It is what I want but I can not find a way to deny impersonate to all logins or users without specifying each one.
Thanks for responding.
February 7, 2013 at 2:08 pm
That makes sense. I was wondering about the reencrypt process because an auditor asked me that question so I wanted to give him an answer.
January 29, 2013 at 12:11 pm
Thank you for the replies. I understand now.
How safe is the reencrypt process? Is there data file ever exposed while it is reencrypted?
January 29, 2013 at 11:41 am
I'm referring to TDE encryption.
When we regenerate the DEK or create a new certificate and encrypt using certificate, does it decrypt/reencrypt the data itself?
January 28, 2013 at 2:37 pm
Thank you! I did find this link http://www.microsoft.com/en-us/download/details.aspx?id=13255 and it is working now. Happy day!
October 18, 2012 at 1:04 pm
I really appreciate you guys help. My roadblock is this:
OLE DB provider "MSDASQL" for linked server "(null)" returned message "[Microsoft][ODBC Driver Manager] Data source name not found and no...
October 18, 2012 at 12:50 pm
Thanks for the example.
I have made a script to do what I believe you indicated.
DECLARE @cmd1 varchar(500), @cmd2 varchar(500), @cmd3 varchar(500)
SET @cmd1 = 'print ''[?]'''
SET @cmd2 = 'IF ''[?]'' NOT...
August 23, 2012 at 12:54 pm
Viewing 15 posts - 91 through 105 (of 252 total)