Viewing 15 posts - 16 through 30 (of 82 total)
This is a great article and a much needed idea.:)
In my opinion something like this should have been built into SSIS as part of standard logging.
December 12, 2008 at 4:46 am
Its great to start seeing some MDX here. I did not know you can use aliases in MDX.
Thanks.
November 17, 2008 at 5:37 am
Hi Andy,
Thomas Keller is absolutely right and explained it very well.
I chose SELECT COUNT(*) because that aggregate function will normally always return a row with a non-null value. That means...
November 7, 2008 at 3:21 am
SQL Server 2005 soes not have data encryption on the wire. Passwords are only weakly protected and I assume you would be using SqlServer authentication and therefore transmitting a password.
If...
September 24, 2008 at 4:36 am
Normally you would not use configuration files to store passwords.
Normally passwords should be embedded within the package and protected through SSIS's encryption mechanism.
You use the DTUTIL.exe with the /ENC and...
September 22, 2008 at 8:02 pm
Frank,
Thanks very much. Both of these sound like workable solutions.
I think I will go with a Script task that tests for existence of the folder as you suggested. While in...
September 22, 2008 at 3:02 pm
If you can establish a VPN to your ISP that would be ideal. It is secure.
You could use transactional or scheduled snapshot replication or SSIS.
I have used replication over a...
September 22, 2008 at 8:40 am
Since no one else has answered I will have a go.
First configurations are only applied when a package is first loaded (befofe validation) so use of a configuration would...
September 22, 2008 at 2:08 am
If you are running a query that crosses partition boundaries, there is a small performance overhead, compared to the same query against a non-partitioned table.
As I understand it the main...
September 21, 2008 at 5:50 pm
Regexp Expressions
Compression of Blobs
Concatenate() aggregate function
All the above have proved useful.
**** The 8K limit is an urban myth!!! ****
see the following for a sample:
May 14, 2008 at 7:15 am
Hi Brian,
Great article. When I read it, it reminded me of something I have never understood about windows logins.
Say I have active directory with user "U" who belongs to 2...
December 29, 2006 at 4:37 am
I agree with most posters here.
The recommended solution should be to use integrated security and do not encrypt the command line.
The encrypted command line means the "good guys" cannot tell...
December 22, 2006 at 6:25 am
I have successfully used RS to do a couple of unusual things:
a) Kick of an SSIS pckage via a job each time a report is run. The stored procedure loop/sleeps...
September 13, 2006 at 6:37 am
Steve,
I agree with most of these people. The ads enable you to run this excellent site without charging us membership fees, so keep on advertising. The page peel ones are...
September 13, 2006 at 6:19 am
Thanks vik. I will speak to the network guys about a backup domain controller.
Regarding the 2005 machines - they may not have been running jobs at the time.
September 8, 2006 at 8:44 am
Viewing 15 posts - 16 through 30 (of 82 total)