by David VanDeSompele – Boost SQL Server performance by avoiding cursors using this row-by-row processing technique.
Tag: sql server
Lawsuit Takes on Microsoft Security Flaws
Microsoft this week was served with a class-action lawsuit surrounding the platform’s vulnerabilities to worms and computer viruses. Legal action echoes assertions presented in a security report issued by an industry association in Washington last week.
Yes/No String
I have a string containing Yes/No answers to a series of questions. How can I quickly count the number of Yes answers and the number of No answers in the string?
Using xp_fixeddrives to Monitor Free Space
Greg Larsen discusses a simple space monitoring method that uses an undocumented SQL Server extended stored procedure named xp_fixeddrives.
Getting the Right Data with SQL Joins
by Susan Sales Harkins, Patricia E. O’ Connor – Associating tables in SQL is usually a breeze. But what happens when you find yourself looking at the completely wrong set of records and you don’t know why? Find out how correctly applying joins can help you understand and avoid these mysterious data
BMC Software Change Manager
Change Manager provides a scalable, intelligent solution to simplify and automate change across multiple RDBMSs. It protects against data loss, and ensures high data availability and quality change processes across complex database and platform environments. Product information.
SQL Server Security
Book by Chip Andrews, David Litchfield, Bill Grindlay – Addresses SQL Server vulnerabilities and provides security solutions. Covers installation, administration, and programming–plus security issues such as authentication, encryption, intrusion detection, and more. Written for IT professionals adm
Can Amazon Serve Customers and Protect Privacy at the Same Time? (What Data Should DBAs Keep and Discard)
by Peter Wayner – As a DBA, you need to consider the kind of data you collect, and whether or not is should be kept or discarded.
6th Annual Data Mining Technology Conference
Join colleagues and the most sought after world-renowned experts in the data mining community for a week of discovery that will change the way your organization uses its data. Featuring four keynote addresses and more than 24 session talks in eight tracks, M2003 will help you discover numerous new w
How Vulnerable Are We?
By Joe McKendrick – Call it this year’s roll call of pain — Slammer, Lovsan, MS Blaster, Welchi, Sobig.F. In recent times, an infestation of worms and viruses has wreaked havoc on computers and networks throughout the world. Are databases safe from all this carnage? The answer, at least for now, is