Viewing 15 posts - 646 through 660 (of 672 total)
David Walker-278941 (10/12/2010)
October 12, 2010 at 11:19 am
TheSQLGuru (10/12/2010)
<SmartA$$ ON>I LOVE it when clients use GUIDs in their database schemas - more tuning work for me!! π <SmartA$$ OFF>
π Yeah, it's really a globaly unique revenue genrating...
October 12, 2010 at 8:30 am
Andy Warren (10/12/2010)
October 12, 2010 at 8:00 am
I have to agree that using a Globally Unique Identifier (GUID or UUID) data type for a normal sized database table row primary key is a waste of memory, space,...
October 12, 2010 at 7:23 am
http://articles.sfgate.com/2008-07-24/bay-area/17171141_1_computer-network-computer-system-bosses
from the middle-ish of the article:
This article was written in 2008 and it's supositions about these special secret modems and thier access to the SF FibreWan did not come out...
August 18, 2010 at 3:29 pm
Steve Jones - Editor (8/18/2010)
I don't think we completely know what happened. That would be limited to a few people
I agree. How about this quote from a member of the...
August 18, 2010 at 2:16 pm
jcrawf02 (8/18/2010)
August 18, 2010 at 12:24 pm
Lots of feelings spilling out here, but the facts are this:
* This was a public network with peoples personal and private record and data on it. It falls...
August 18, 2010 at 7:00 am
Only one person can insert identity on a column at a time, so WE can not... :hehe:
August 16, 2010 at 7:09 am
I selected error becuase with the given code example it was the answer closest to the result. I understand the point your question was trying to make. Your...
August 12, 2010 at 7:13 am
"The LUN was a single disk instead of an array, and used this to prove they should be in charge of disk design when performance problems ensued."
My comment is...
July 20, 2010 at 7:24 am
Some process could still stuck updating your Database table. Or at the very least that is what the database belives.
Use the Activity Manager and kill all processes attached...
June 29, 2010 at 7:42 am
IMO the number one Internet security flaw is user execution of un-known content.
You do not know how many times I had to clean root kits of computers because someone had...
June 15, 2010 at 7:36 am
This is like playing Jepordy!
My answer to the Daily Double is:
"Why they wrote COBAL and why it failed."
Does anyone actually remember why they wrote COBAL? I know it was case...
May 21, 2010 at 9:40 am
Q: what should we do after capturing the queries involved in blocking?
A: Review all application queries making certain all table selects have NOLOCK hints and all updates or inserts have...
May 10, 2010 at 1:28 pm
Viewing 15 posts - 646 through 660 (of 672 total)