Join us March 28, 2024, as we discuss some of the most promising emerging cybersecurity technologies and how you can adopt them into your organizations.
I'm embarrassed to admit that I own a Pocket PC but rarely use it. I hang my head in shame at conferences when true uber-geeks whip out their expandable keyboards like the gunslingers of yesteryear and start typing away, while I pull out paper and...
SQL Server Books Online (BOL) doesn't document a way to view error logs from your application. But two undocumented extended stored procedures in SQL Server 2000 and 7.0—sp_enumerrorlogs and sp_readerrorlog—let you examine error logs so that you ...
Editor's Note: Send your SQL Server questions to Microsoft's SQL Server development team at [email protected].
What kind of stored procedure can I use to transfer data from a text file to SQL Server?
Listing 1 shows a stored procedure th...
A variety of businesses use a type of analysis called dependency risk analysis. This type of analysis determines whether one group of items in your business (e.g., products) is overly dependent on just one item of another group (e.g., customers)...