Viewing 15 posts - 5,896 through 5,910 (of 5,986 total)
niall.baird (6/23/2010)
I like to see a comment block/change register at the top of each stored proc/function, something like
/* ************************************
Name: pu_mytable
Purpose: Updates dbo.MyTable with values from...
June 24, 2010 at 3:47 pm
Steve Cullen (6/22/2010)
June 22, 2010 at 1:52 pm
I don't think it should be considered a technical best practice to either use or not use schemas; I think it mostly just an extension of one's overall naming convention,...
June 22, 2010 at 9:19 am
Any thoughts about how to comment a block of T-SQL ?
I do this often, but over time I havn't been consistent with it.
/* begin: What I'm doing here...
June 21, 2010 at 11:20 am
Here is how I would format the same SQL. I like all lowercase and indent my joins, which makes it easier to read when there are four or more joins.
select
...
June 18, 2010 at 3:15 pm
ken.trock (6/18/2010)
Also, I think it's important to capitalize keywords too. Something handy for that is using highlight the keyword you want to upper case and use Ctrl+Shift+u. Back to one...
June 18, 2010 at 12:14 pm
Mike B-269836 (6/18/2010)
One of the other things that drives me nuts is cryptic naming of...
June 18, 2010 at 10:57 am
Talking about the importance of code formatting and naming conventions in the context of computer programming is like talking about fairness in the context of politics. Everyone nods and agrees...
June 18, 2010 at 7:35 am
Seeing that Google is developing it's own operating system, Chrome, I guess this move was inevitable. However, the hacking of Google's China division was a targeted attack; they can't hide...
June 16, 2010 at 8:52 am
Microsoft developers have better things to do with our time than write computer virusus and hack networks, which is why you don't see as many attacks targeting Mac and Linux.
June 15, 2010 at 11:14 am
One really bad data modeling mistake that can appear to work fine fine for months or years in production, but then present a major headache down the road, is when...
June 15, 2010 at 10:17 am
A web browser is like an external door on a corporate building; it's where people enter and leave the network. Even if hackers found a way to biggy back an...
June 15, 2010 at 8:08 am
Reading articles related to the attack on Google, I am left with the impression that it was a security hole in IE6 that was exploited, not necessarily Windows. What is...
June 15, 2010 at 7:35 am
Thomas-282729 (6/9/2010)
RichB (6/9/2010)
Thomas-282729 (6/8/2010)
June 10, 2010 at 9:17 am
You mentioned earlier that your application may on occasion be executing this procedure thousands of times per second. There are several different things that can cause blocking. One is blocking...
June 10, 2010 at 7:20 am
Viewing 15 posts - 5,896 through 5,910 (of 5,986 total)