(Jaya Nehru Kumar) Ever created a bunch of stored procedures for testing purposes and went to drop them but couldn’t remember all the names you created? A way to avoid this is to group multiple stored procedures under a single name.
Tag: sql server
How to perform anomaly detection
This tip shows you how to use the PredictCaseLikelihood() DMX function to detect anomalous data.
MD5 Hash SQL Server Extended Stored Procedure
(Vic Mackey) This is an extended stored procedure for Microsoft SQL Server 2000 that implements an optimized MD5 hash algorithm. It is intended to work much like the MySQL MD5() function. The algorithm was taken from here. I only added the md5_string() function. The DLL should work for older version
MDX Essentials: Set and String Functions: The GENERATE() Function
(William Pearson) In this lesson, we will introduce a function that provides us the ability to derive a set by systematically applying a set expression to each of the members of a set we define. GENERATE() is a potent function in our MDX toolset, in that it enables us to select precisely only certai
Microsoft SQL Server and Itanium 2: High Performance and Low TCO
The industry excitement over 64-bit processing capabilities on the Intel platform in the last several months has been explosive. Probably the most appealing feature of 64-bit is the ability to directly address large physical memory – currently as high as 512 GB on the Windows 2003 platform. M
Quick! Which specific SQL Server user is logged into which database?
(Serdar Yegulalp) SQL Server’s master database stores tables with important and constantly updated information about the state of the SQL server. One of these tables, sysprocesses, can be used to track (in SQL Server itself) which SQL Server users are currently logged in and which database(s) they a
Effective Strategies for Data Mining
Databases were developed with an emphasis on obtaining data; more data meant more information. Professionals trained in decision support analysis analyzed such data and discovered information in the form of patterns and rules hidden in the relationships between its various attributes. This assisted
T-SQL implementation of SKIPJACK
(David Janecka) This source code is an T-SQL implementation of the crypt algorith SKIPJACK as a user function for MS-SQL 2000.
SQL Server 2005 Integration Services: Lessons from Project REAL
Richard Waymire, Len Wyatt, John H. Miller and Donald Farmer) In Project REAL we are using large volumes of real data and scenarios from real companies to implement business intelligence systems using early releases of Microsoft SQL Server 2005. In the process, best practices are being developed
New HTTP Endpoints Create SQL Server 2005 Web Services
(Peter DeBetta) SQL Server 2000 offers some capabilities for returning XML output via HTTP using SQLXML—and, of course, SQLXML supports Web services creation. Although not rocket science, setting up, configuring, and using Web services in SQL Server 2000 does require a little effort (see the SQLXML
