LINQ to SQL in Action: Joining and GroupingCommented on: 6 years ago
(May 12, 2009)
Marco, thanks for your comment. Here's Dino Esposito's reply:
"The reader is right when he says that most of the time T-SQL statements written by programmers are the main cause of troubles. However...
Build the Numbers Table You NeedCommented on: 6 years ago
(February 19, 2009)
Uh oh, I don't know what happened to the article, but I'll get the problem fixed as soon as possible. Anne Grubb, web editor
SQL Server 2008 Editions - 30 Oct 2008Commented on: 6 years ago
(November 6, 2008)
ledman, here's Mike Otey's response to your question: "Yes. The SQL Server 2008 Developer Edition can be used by multiple developers. You don’t need a separate copy for each developer." Thanks for...
Performance Effects of Using GUIDs as Primary KeysCommented on: 6 years ago
(October 23, 2008)
Eugene, thanks for pointing out the missing links. I've updated them with the correct URLS in the article. The links are:
The Cost of GUIDs as Primary Keys, http://www.informit.com/articles/article....
Migrating to SQL Server 2008Commented on: 7 years ago
(August 18, 2008)
Hi pward, Thanks for your feedback. Have you checked out any of the articles or other resources in the Learning Path, Related Articles, and resources lists--see the list titled "Learning Path,"...
Using DTS to Populate a Data WarehouseCommented on: 7 years ago
(July 24, 2008)
Thanks, Marcos. As you mentioned, we do have online archives for SQL Server Magazine articles, going back to the first issue--March 1999. I often see reader comments on older articles and am glad to...
Rebuild Only the Indexes that Need HelpCommented on: 7 years ago
(July 1, 2008)
DHAY1999, thanks for notifying us of the problem. The procedure in Listing 1 does indeed appear incomplete. I will contact the editor and get the problem resolved ASAP.
I’ll sound a bit like Captain Obvious for bringing this up, but it’s important to remember that security encompasses a lot more than protecting sensitive data from the specter of outsider threats like hackers. Properly implemented security policies also account for threat-models that include insiders – or people within your organization....More
There’s simply no way to overstate the importance of regular Transaction Log Backups. Not only do they help protect from disaster, but regular execution of T-Log backups on Full (and Bulk-Logged) Recovery databases helps keep thing “fit and trim”. Most of the time, setting up a Notification for when T-Log Backup Jobs fail is enough to let you know when something goes wrong....More
Code like this isn’t optimal:
IF EXISTS(SELECT * FROM sys.objects WHERE name = N'TableToDrop' AND type = 'U')
DROP TABLE TableToDrop;
Neither is this:
IF EXISTS(SELECT TABLE_NAME FROM INFORMATION_SCHEMA.TABLES WHERE TABLE_NAME = 'TableToDrop')
DROP TABLE TableToDrop;
Yet, I see both of those used all of the time – over and over again. Even though it’s 2015. ...More