Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
Although it's the birthplace of spam, the Internet has many redeeming qualities. Sometimes when you're stumped by a SQL Server problem, you can use the Internet to find information and solutions. Not all advice is good advice, but the Web provides...
In the solution I describe in the main article, I used the destination Products_TypeN dimension tables as the bindings tables in the Data Driven Query (DDQ) tasks. Because the dimension tables don't contain bit columns that indicate an attribute...
When a product is deleted from your production system, you don't necessarily want to delete it from your data warehouse; you probably keep historical data that correlates to the discontinued products. In the scenario I discuss in the main article...
Would you and others in your company like to make better decisions faster? Would your company like to capitalize on information assets to thrive in a competitive marketplace? The Microsoft SQL Server Accelerator for Business Intelligence (BI), a...
Cesar Cerrudo and Mark Litchfield of Next Generation Security Software discovered multiple vulnerabilities in SQL Server 2000 and Microsoft SQL Server Desktop Engine (MSDE) 2000, the most severe of which can lead to remote compromise of the...