Script Database Objects with SMO
One of the big changes with SQL Server 2005 is the evolution of SQL-DMO to the new SMO managed code assemblies. Author Raj Vasant brings us quite a bit of code to show how this can be used to script your objects.
One of the big changes with SQL Server 2005 is the evolution of SQL-DMO to the new SMO managed code assemblies. Author Raj Vasant brings us quite a bit of code to show how this can be used to script your objects.
Will multiple processors or a dual core processor be beneficial to you, and what are the differences between them? These are the questions this article will attempt to lay to rest.
Do you use identity values? Do missing values ever cause problems? Maybe you need to look for missing invoices? Stephen Lasham brings us a technique for finding those missing values in a sequence.
In this article I will show you how you can implement security on a WCF service. There are many options and extensibility points for implementing security in WCF. You can also use specific products, such as the Windows 2003 Server Authorization Manager, together with WCF to implement the authorization requirements of a solution. Out of the box, WCF supports Windows credentials, Username Tokens and X.509 Digital Certificates as security credentials.
InfoPath forms can be saved to XML, these XML Files can later be used in SSIS XMLSource adapter to pull out the data in tables and columns. However, there are some common problems you may meet in these scenarios. This article describes how to work around these potential problems. The issues mentioned in this article is not only specific to InfoPath files, it can also be referenced in other similar situations as well.
It is something you do rarely, but with SQL Server 2005 and ten services, there are more decisions to make. Steve Jones gives some advice on which service accounts to choose and some common problems with others.
Most of the time, it's the simplest tools that have the biggest impact on our lives. If you have a camera and believe, like Leonardo DaVinci, that simplicity is the ultimate sophistication, then why not enter Red Gate's Ingeniously Simple Tools photo competition...
To enter is simple. All you need to do is send us a photo of your favorite, simple tool.
One of our expert authors has written some encryption tools for the community to use. However as he readies an extensive series, he's looking for some testers that want to work with encryption on the SQL Server 2000 servers.
There are many changes in SQL Server 2005, especially for the SQL Server developer. New options, features, and changes in the way you program. New author M. Choirul Amri brings us the first in a series on the changes from the point of the developer.
Doug Reilly gives his personal perspective on the responsibilities of a cancer-surviving software developer.
This article provides a comprehensive overview of the ORDER BY clause within SQL window...
By Rob Sewell
Getting clients is tough. Here's actionable advice to make building business easier.
Want to build a data analytics foundation that transforms raw data into valuable business...
Comments posted to this topic are about the item New article
Comments posted to this topic are about the item Monitoring Azure Blob Storage
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers