Viewing 9 posts - 1 through 9 (of 9 total)
Jeff Moden (5/8/2012)
david.rowland (5/7/2012)
May 8, 2012 at 7:33 pm
Although RegEx is powerful, I have tried using it once and found that coding my own CLR function to manipulate strings to what I want was 100 times faster than...
May 7, 2012 at 9:11 pm
GSquared (6/15/2011)
SELECT
eggs,
cheese,
milk,
--bread,
cookies,
salt,
...
June 15, 2011 at 4:20 pm
My coding method is more like the following:
SELECT
eggs
,cheese
,milk
,bread
,cookies
,salt
...
June 14, 2011 at 5:15 pm
Thanks for that reply.
Overlooked that on the books.
November 12, 2009 at 2:09 pm
Removing access to the servers BUILTIN\Adminstrators group to an IT Infrastrure team just so they cannot create a login to SQL Server will be like not allowing DBA's access to...
November 5, 2009 at 9:46 pm
If a hacker wants to read this article thinking they can use it to hack into SQL Server databases, then they will be disappointed.
The title is fine.
November 4, 2009 at 2:47 pm
Thanks for this ariticle. Could come in handy one day.
Just a few things to clear up from some of the comments here:
1. You just need to be a...
November 3, 2009 at 4:17 pm
My rule of thumb for removing cursors is to try to replace them with a set based operation if I can.
I would rather use several set based queries and then...
January 4, 2009 at 2:30 pm
Viewing 9 posts - 1 through 9 (of 9 total)