I’ve spent a lot of time considering when, and if, business intelligence may cross the line. Is there a point when BI becomes profiling? When does "The Minority Report" become a reality and we’re looking to use information and trending data to prevent things that haven’t happened yet? We’re in this constant state of protection upgrades with travel, terrorism and […]
Other News
Full Text Indexing in SQL Server 2008
Virtual Training – SSIS, and Replication February 1 – 28, 2011 Here is an opportunity for you to add or extend your SQL Server skills in the areas of SQL Server Integration Services (SSIS) and/or SQL Replication. As Steven wrote a while back, there are so many skills a SQL Server professional needs to have today, its difficult to keep […]
Unicode Compression in SQL Server 2008R2
Virtual Training – SSIS, and Replication February 1 – 28, 2011 Here is an opportunity for you to add or extend your SQL Server skills in the areas of SQL Server Integration Services (SSIS) and/or SQL Replication. As Stephen wrote a while back, there are so many skills a SQL Server professional needs to have today, its difficult to keep […]
XQuery for the Non-Expert – @Variable Use
(Jason Strate) In a previous post, I discussed the exist() method as part of the XQuery for the Non-Expert blog series.
XML Schema 1.1 – What you need to know
(Ramkumar Menon) XML Schemas, more popularly known as XSDs, provide us a way to describe structure and content of XML Documents. Managed by W3C’s XML Schema WG, a part of the XML Activity Group, XML Schemas evolved out of the shortcomings of its simpler and light-weight non-XML predecessor – DTDs, a
SQL Database Mail — Cleanup of Logging Records
(Yuhong Li) Similar to SQL Agent logging history, Database Mail has own logging history. When the logging history is grown too big, you can run T-SQL sysmail_delete_log_sp to clean the logging records. Several examples of using this stored procedure are provided here.
Create three-level taxonomy modeling strategies using W3C XSD and OASIS CAM
(Piers Michael Hollott) Often when people create a vocabulary to describe a problem-space, they find themselves using a taxonomy that divides the problem-space using three levels. For example, in a financial application, a ledger record might be identified categorically (debit or credit) and then br
Subterranean IL: Exception handling 2
(Simon Cooper) Control flow in and around exception handlers is tightly controlled, due to the various ways the handler blocks can be executed. To start off with, I’ll describe what SEH does when an exception is thrown.
AllowHtml Attribute in ASP.NET MVC 3
(David Hayden) If you are learning ASP.NET MVC 3 or curious as to the new features in ASP.NET MVC 3, you can check out my list of ASP.NET MVC 3 Tutorials.
Hash Aggregation
(Randolf Geist) Oracle introduced in Oracle 10g the hash aggregation as a new feature. It can be used for both GROUP BY and UNIQUE operations (HASH GROUP BY and HASH UNIQUE respectively) and is by default the preferred aggregation method if there is not a particular reason that lets the cost based o
