(Don Jones) SQL Server stores some of your organization’s most important data, so recovering in the event of a devastating failure — like that of the hardware itself — is crucial. Clustering, log shipping and database mirroring offer SQL Server data protection against a server failure.
Other News
Analytics Is the Answer: Three reasons to your business needs your DB2 z/OS analytics
(Dave Beulke) While recently speaking at the Minneapolis, Milwaukee and Chicago DB2 User Groups, it was really nice to hear all the opinions and different points of views on DB2 10 from all my familiar friends.
Print in C#
(Mahesh Chand) So you want to learn how to do printing using C#. Here is your complete guide.
Dimensional modeling with IBM InfoSphere Data Architect, Part 2: Reverse engineering
(Yun Feng Bai and Qi Yun Liu) Starting with IBM InfoSphere Data Architect V7.5.3, you can create both relational data model and multiple dimensional data models by using InfoSphere Data Architect.
Cursor in MySQL
(Arjun Panwar) In MySQL, a cursor allows row-by-row processing of the result sets. A cursor is used for the result set and returned from a query. By using a cursor, you can iterate, or by step through the results of a query and perform certain operations on each row.
SQL Server High Availability Options
(Brady Upton) I need to implement a high availability solution for one of my SQL Server databases, but I’m not sure of which option to implement to satisfy my company’s needs. Check out this tip to learn about the five native SQL Server High Availability options.
Server Automation
Server Automation The end of the year holidays are nearly here. Now’s the time to make sure your automated tasks are tuned up so that you can enjoy a great holiday without interruptions. Here’s a quick checklist: Backup Strategy is working and validated for adequate space Automated tuning processes are working Disk allocation is adequate Tables are defragmented Databases are […]
Killing Fragmentation
Top Five SSWUG TV Episodes of 2011 SSWUG TV was introduced in 2011 extending the already popular SSWUG media content. We added new segments on top of the regular interviews with thought leaders around the IT field. We picked our top 5 episodes in this new format, recaping some of the great content provided by our team and guests. 1. […]
How to validate a textbox for range of values,correct date?
(SheoNarayan) In scenarios where we want to validate a textbox for the specific range of values, and ensure that the correct Date to be entered, we can follow this approach.
Tracing to Event Logs
Using tracing within an application allows its activities to be logged and reviewed later to assist with identifying and resolving bugs. Messages can be sent to various locations, including Windows event logs that can be examined using the Event Viewer.
