Beware to the System Generated Constraint Name
New columnist Gregory Larsen used to not care what his objects were called until recently when he began to become concerned with the system generated constraint names. This short article tells you why.
New columnist Gregory Larsen used to not care what his objects were called until recently when he began to become concerned with the system generated constraint names. This short article tells you why.
This article briefly discusses SQL Server's data and procedure cache and shows you the common Transact-SQL statements/command and system tables that you can use to interact with the cache through Transact-SQL.
Microsoft is now accepting nominations for beta testers for SQL Server 2000 (64-bit), SQL Server 2000 Windows® CE Edition (SQL Server CE) version 2.0, and SQL Server 2000 Service Pack 3 (SP3). Any SQL Server customer can participate.
Bill Wunder has done it again with his newest release of his DDL Archive Utility, which can pull entire schemas into Source Safe automatically.
Recently Steve Jones noticed that someone wanted to use a UDF to enforce uniqueness. No big deal, right? Well this person wanted to enforce uniqueness based on some other column value. A bit of a challenge, but this article presents a couple ways to handle this.
This article introduces TSQLDoc, a Windows Script Host script that extracts procedure metadata and embedded documentation comments from Transact-SQL stored procedures, generates XML documentation for every stored procedure in a database and optionally transforms the XML document into HTML or other format using XSLT.
This article shows you how to take a shaped recordset and convert the results into XML all while preserving the shaped recordset hierarchy.
The behavior of SQL Server is influenced in many ways by the various settings and options available. This series will examine some of the ANSI options that can be set and changed in SQL Server.
Get a sneak peak of some of the sections from Start to Finish Guide to SQL Server Performance Monitor. Find out what counters to watch and what their thresholds are.
This article explains how orphan users get created, and provides you with troubleshooting information. A bonus stored procedure called ShowOrphanUsers is included, that goes and searches all the databases and generates a complete list of orphan users.
By Steve Jones
The season 1, seventh episode of Simple Talks is out. Check it out, with...
By Steve Jones
the McFly Effect – n. the phenomenon of observing your parents interact with people...
At a recent conference I was asked how I executed code during my presentation....
Invoke-Sqlcmd -Query "ALTER AVAILABILITY GROUP $AAG REMOVE DATABASE $DB " -ServerInstance $Instance Invoke-Sqlcmd :...
I assume SSMS V20 encryption and SQL Server SSL encryption are different. I have...
Comments posted to this topic are about the item Enable a Disabled Index
I have disabled the LoggerCI index on the dbo.Logger table. How do I enable it?
See possible answers