Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
I have a Microsoft Access 2000 application with SQL Server 2000 as the back end. To prevent Access users from viewing all the data in a SQL Server 2000 table, I want to use a view that displays only data rows that the user has been authorized to...
Our company has three servers. One server is situated at the head office, and the other two servers are located 150 miles away. These servers communicate only through a dial-up connection. I want to use Data Transformation Services (DTS) to update...
Although it's the birthplace of spam, the Internet has many redeeming qualities. Sometimes when you're stumped by a SQL Server problem, you can use the Internet to find information and solutions. Not all advice is good advice, but the Web provides...
In the solution I describe in the main article, I used the destination Products_TypeN dimension tables as the bindings tables in the Data Driven Query (DDQ) tasks. Because the dimension tables don't contain bit columns that indicate an attribute...
When a product is deleted from your production system, you don't necessarily want to delete it from your data warehouse; you probably keep historical data that correlates to the discontinued products. In the scenario I discuss in the main article...