Enumerate all the indexes in a SQL Server database
The indexing schema plays a fundamental role in performance tuning, and tools such as the Index Tuning Wizard that can suggest efficient schemas on the grounds of a database usage.
The indexing schema plays a fundamental role in performance tuning, and tools such as the Index Tuning Wizard that can suggest efficient schemas on the grounds of a database usage.
At times a database appears to be marked as “suspect” in the Enterprise Manager. SQL Server marks a database as suspect with it can’t access the database. What happens at
Using the sp_user_counterX stored procedure (where X is a number between 1 and 10) you can set internal SQL Server counters. This values are read by the Performance Monitor, the
This article explains how you can create a Microsoft Word document from T-SQL and fax it through a method exposed by its Automation object model. You can create and destroy
You can reuse resources from other connections by resorting to two little known SQL Server’s stored procedures, which allow several connections to share the same transactional space: sp_bindsession and sp_getbindtoken.
This control does one thing, but does it well. It centers a picture on an MDI forms Client area. Windows Meta Files (WMF) can be transparent. Just place the control
The MSDE database engine is 100% compatible with SQL Server and subject to the same license policy of the Jet engine. One of the fundamental differences between MSDE and SQL
SQL Server provides several security levels, and the control that the system administrators can pursue over the DB’s objects is extremely accurate. It’s often useful to know which rights each
One of the neatest features in SQL Server 7 and later versions is the capability to query external data sources through their OLE DB providers, in other words behaving exactly
If you haven’t localized SQL Server for your language, the default date format is the American one: DD/MM/YY. You may need to display a date in different formats, and you
In order to assist continuous and effective monitoring of lock status, SQL Server offers the system stored procedure SP_LOCK, which can provide several useful pieces of information on how locks
Restoring a corrupted master database is one of the most difficult tasks you may have to deal with. If this catastrophic event happens, here’s how to proceed. First, you need
Editor’s note: This is the third and final part of a series about how to build your own XML editor. f you’ve been looking for a cross-platform, open-source, XML editor,
s I’ve shown in my previous 10-Minute Solution, “Choosing the Right Backup in SQL Server,” SQL Server provides you with numerous ways to back up your database, allowing you to
uring my years as a database developer I have often faced the task of finding and deleting duplicate data in a database. Duplicates impact data accuracy and credibility, and they
f you look at it from one perspective, the Java programming language at age six is only in first grade. On the other hand, Java’s significant strengths and large base
The common way of calling a function through a pointer is using the pointer as if it were a function. In other words, if p is a pointer to a
You can define a member function that is a template in a non-template class. For example: class A{public: template void func(); // member template }; How can you call such
A generator is a function or algorithm returning a series of values upon successive calls. The most common example is a random number generator although generators have many other useful
The standard iostream family of classes defines the widen() member function which converts a single char to its wide-character equivalent. widen() has the following prototype: char_type widen(char c) const; The
In a previous tip, I showed how to convert a string containing a hexadecimal to int using the sscanf() function. stringstream objects can perform this feat too, in a more
In addition to the widen() member function, the iostream framework supports the narrow() member function which performs the reverse operation, i.e., converting a wide character to its corresponding char value.
Conceptually, destructors of global objects are called after main() has exited. For this reason, many debugging and memory checking tools are confused and report phantom memory leaks or warn about
Unlike C-strings, a std::string object may contain null characters in the middle of its internal buffer. For example: std::string s= Related Posts Even More Robust Features in Updated Devart ODBC
By an unfortunate twist of fate, the term Related Posts Docker Update Adds Orchestration CapabilitiesAdding a Mask in CSSOracle, Salesforce, Microsoft lead AI agentic workforce5G Testbeds Are Revolutionizing Naval OperationsAcer
Consider the following example: class A : public list < A >{ // …}; Does your compiler accept it? According to the Standard, using an incomplete type as a template
To execute a UNIX shell script, first the shell needs to be executed. This can be done using an object of java runtime class. rtime = Runtime.getRuntime();Process child = rtime.exec(
Public methods and member variables of Java applets are visible to HTML documents. This makes the methods and variables can be accessed using JavaScript. The syntax for doing this is
The file Java/Javalog.txt in the Windows directory (i.e. C:windowsJava.Javalog.txt for windows and C:winntJavaJavalog.txt for NT) contains information for the last applet that was loaded by Internet Explorer. This file contains
Class javax.servlet.http.cookies can be used to access cookies on the client side. The following code demonstrates this technique. The code also checks for the cookie names in order to access