The Integration of Unstructured Data into a Business Intelligence Syst
This article discusses the challenges of merging unstructured data into BI systems and provides an example of such a merge to solve an organizational problem.
This article discusses the challenges of merging unstructured data into BI systems and provides an example of such a merge to solve an organizational problem.
SQL Server 2005 has changed quite a bit about the way DBAs will work with SQL Server. One of the new tools is the SQLCMD utility that will replace isql and osql as the command line utility. Author Andre Vigneau brings us a first look at this new tool and how you can do a few neat tricks with it.
In this article, we continue our discussion on high availability and scalability enhancements in SQL Server 2005 Beta 2 release. Features such as clustering, database mirroring, online indexing, fast recovery, database snapshots, and snapshot isolation transaction level have already been covered earlier in this series - now we will concentrate on the remaining features, such as a new method of table and index partitioning, backup and restore improvements, and new hardware support options.
Business intelligence is awash in so many products, buzzwords and technologies that it is often hard to see the forest for the trees. It is at times like this that I put on my industry analyst's cap and muse, "Hmm, what is this: manage, monitor or model?" This tripartite way of looking at the world has served my clients well, and I thought I'd pass it along.
SQL Server has drivers to read almost any data source, but they are not always the easiest to work with. New author Kevin Terry spent quite some time learning how he could pull data from Outlook using DTS and scripting. Most information on the internet requires Exchange to be on the same server as SQL Server to get the data, but this solution works with any configuration, and can pull any information, email address, contact information, etc. from Outlook.
General optimization of RS' performance is, beyond argument, one of the more important functions of the Administrator. In evaluating performance from various perspectives at the Administrative level, one readily useful source of information is the data we can obtain from the logs created by the system itself. Reporting Services generates a number of log files to capture information about server operations, status, and so forth. Within this group of logs, which we will explore individually within prospective articles within our series, the Report Server Execution Log is a great place to start in setting up a basic performance and auditing analysis capability.
In this installment of our series covering new and improved functionality of SQL Server 2005 Beta 2, we will focus on the topic of security, which has been becoming increasingly prominent among the issues on every database and system administrator's agenda. A new approach to software development started with the Trustworthy Computing initiative launched in early 2002, necessitated by the growing number of exploits directed at the Microsoft operating system and applications, resulted in a "secure by default" product with highly customizable security features further increasing the degree of protection. We will start with the features related to authentication (the process of identifying logins connecting to the SQL Server and users accessing databases), and continue with authorization (determining the level of permissions granted once the initial connection is established) and encryption in the future articles. In particular, we will cover here, password policy implementation and management as
This paper explains how batches are cached and reused in SQL Server 2005, and suggests best practices on maximizing reuse of cached plans. It also explains scenarios in which batches are recompiled, and gives best practices for reducing or eliminating unnecessary recompilations.
Many Enterprises create and maintain applications that reside on "IBM Lotus Domino Server." Since the Lotus Domino server has the capability of handling applications and messaging, it has become a prime requirement for a SQL Server DBA to cross- reference data or import and export data to and from the Domino database and SQL Server databases. In this article, I am going to discuss how to use SQL Server Linked server to connect to databases that reside on the Lotus Domino server. The steps involved in connecting to the Lotus notes mail server database can be used for connecting to other databases that reside in "Lotus Notes Domino" server.
When a DBA is managing many different SQL Server boxes, it can be a tedious job to find the port numbers used by all of the SQL Servers. In this article, I would like to discuss several methods for finding the Port numbers used by SQL Server.
Have you ever wondered where a certain field is used in a report? Or...
By Steve Jones
One of our internal people was looking to test some process in (I assume)...
By James Serra
Announced at Microsoft Ignite last week were some new product features related to the...
I am using the following script to import data from a json file. This...
When I connect to my SQL Server using SQL Server Management Studio (SSMS) from...
Hi all! I’ve been using MySQLCalculator.com for memory calculations, but I’m looking for alternatives...
Which of these inputs is the smaller input to a hash join?
See possible answers