External Article

SQL Server 2005 Part 5 - High Availability and Scalability Enhancement

In this article, we continue our discussion on high availability and scalability enhancements in SQL Server 2005 Beta 2 release. Features such as clustering, database mirroring, online indexing, fast recovery, database snapshots, and snapshot isolation transaction level have already been covered earlier in this series - now we will concentrate on the remaining features, such as a new method of table and index partitioning, backup and restore improvements, and new hardware support options.

SQLServerCentral Article

Coupling Outlook to SQL Server

SQL Server has drivers to read almost any data source, but they are not always the easiest to work with. New author Kevin Terry spent quite some time learning how he could pull data from Outlook using DTS and scripting. Most information on the internet requires Exchange to be on the same server as SQL Server to get the data, but this solution works with any configuration, and can pull any information, email address, contact information, etc. from Outlook.

External Article

MSSQL Server 2000 Reporting Services: Black Belt Administration: Prepa

General optimization of RS' performance is, beyond argument, one of the more important functions of the Administrator. In evaluating performance from various perspectives at the Administrative level, one readily useful source of information is the data we can obtain from the logs created by the system itself. Reporting Services generates a number of log files to capture information about server operations, status, and so forth. Within this group of logs, which we will explore individually within prospective articles within our series, the Report Server Execution Log is a great place to start in setting up a basic performance and auditing analysis capability.

External Article

SQL Server 2005 Part 1 - Security (Authentication)

In this installment of our series covering new and improved functionality of SQL Server 2005 Beta 2, we will focus on the topic of security, which has been becoming increasingly prominent among the issues on every database and system administrator's agenda. A new approach to software development started with the Trustworthy Computing initiative launched in early 2002, necessitated by the growing number of exploits directed at the Microsoft operating system and applications, resulted in a "secure by default" product with highly customizable security features further increasing the degree of protection. We will start with the features related to authentication (the process of identifying logins connecting to the SQL Server and users accessing databases), and continue with authorization (determining the level of permissions granted once the initial connection is established) and encryption in the future articles. In particular, we will cover here, password policy implementation and management as

External Article

Connect to Lotus Domino using SQL Server Linked Server

Many Enterprises create and maintain applications that reside on "IBM Lotus Domino Server." Since the Lotus Domino server has the capability of handling applications and messaging, it has become a prime requirement for a SQL Server DBA to cross- reference data or import and export data to and from the Domino database and SQL Server databases. In this article, I am going to discuss how to use SQL Server Linked server to connect to databases that reside on the Lotus Domino server. The steps involved in connecting to the Lotus notes mail server database can be used for connecting to other databases that reside in "Lotus Notes Domino" server.

Blogs

Finding fields used in a Power BI report in PBIR format with Semantic Link Labs

By

Have you ever wondered where a certain field is used in a report? Or...

Adding Test data to msdb.sysjobhistory

By

One of our internal people was looking to test some process in (I assume)...

Microsoft Ignite Announcements Nov 2024

By

Announced at Microsoft Ignite last week were some new product features related to the...

Read the latest Blogs

Forums

Import data from json file with special characters

By don075

I am using the following script to import data from a json file. This...

% processor Time in Activity monitor is greyed out

By IT researcher

When I connect to my SQL Server using SQL Server Management Studio (SSMS) from...

Tools for MySQL memory estimations and optimization?

By EdZzy

Hi all! I’ve been using MySQLCalculator.com for memory calculations, but I’m looking for alternatives...

Visit the forum

Question of the Day

The Hash Join II

Which of these inputs is the smaller input to a hash join?

See possible answers