Search - Articles
DevASP.NET for ASP.NET, VB.NET, XML and C# (C-Sharp) Developers Tuesday, March 03, 2009
Dev Articles
Search Directory
ASP.NET
VB.Net
C-Sharp
SQL Server
 


Home >Search > Support WebCasts
Search:
What's New - What's Hot
Listings for .NET Framework .NET Framework (49)
Listings for ADO.NET ADO.NET (15)
More Categories for ASP.NET ASP.NET (28)
Listings for ASP.Net 2.0 ASP.Net 2.0 (34)
More Categories for C#  ( C-Sharp ) C# ( C-Sharp ) (2)
Listings for Internet Explorer Internet Explorer (99)
Listings for MSDN Show MSDN Show (16)
More Categories for Operating Systems Operating Systems (610)
More Categories for Server and Networking Server and Networking (186)
Listings for SharePoint Server SharePoint Server (834)
Listings for SQL Server 2000 SQL Server 2000 (21)
Listings for SQL Server 2005 SQL Server 2005 (148)
Listings for SQL Server 7.0 SQL Server 7.0 (39)
More Categories for Visual Basic .NET Visual Basic .NET (5)
More Categories for Visual Studio .NET Visual Studio .NET (17)
Listings for Visual Studio 2005 Visual Studio 2005 (50)
More Categories for Visual Studio 2010 Visual Studio 2010 (12)
More Categories for Web Services Web Services (16)
Listings for XML XML (0)
 


Upsize Your Database: Convert Your Microsoft Access Application to Take Advantage of SQL Server 7.0  Version: 0.00     Price: $0.00  
Total Hits: 26  |  Today: 0Author: Michael McManus      Rating:  
Read Reviews | Write Review |  Your Rating: 

What if you need to convert an existing Microsoft Access 97 database application into a true client-server application that is based on a SQL Server back end? If you know a little about Visual Basic and SQL Server, it's easy to make your app take advantage of the power and scalability provided by SQL Server 7.0....

Undocumented SQL Server 7.0 System Tables  Version: 0.00     Price: $0.00  
Total Hits: 43  |  Today: 0Author: Alexander Chigrik      Rating:  
Read Reviews | Write Review |  Your Rating: 

In this article, I want to tell you about undocumented system tables shipped with SQL Server 7.0. These tables are used by some system stored procedures and stored in the master database (only the sysfiles1 system table is stored in each database)....

SQL Server 6.5 Useful Undocumented Stored Procedures  Version: 0.00     Price: $0.00  
Total Hits: 51  |  Today: 0Author: Alexander Chigrik      Rating:  
Read Reviews | Write Review |  Your Rating: 

In this article, I want to tell you about some useful undocumented stored procedures shipped with SQL Server 6.5....

How Updates are Performed in SQL Server 6.5  Version: 0.00     Price: $0.00  
Total Hits: 30  |  Today: 0Author: Alexander Chigrik      Rating:  
Read Reviews | Write Review |  Your Rating: 

SQL Server 6.5 can use two different methods to update records, depending on the circumstances. They include:

* Direct Update
* Deferred Update

Each method affects performance in a different way, as we shall see in this article....

Data Page Structures in SQL Server 6.5  Version: 0.00     Price: $0.00  
Total Hits: 46  |  Today: 0Author: Tom Pullen      Rating:  
Read Reviews | Write Review |  Your Rating: 

In this article, I want to tell you about data page structure in MS SQL Server 6.5, which are substantially different that what you currently find in SQL Server 7.0 and SQL Server 2000....

Some Useful Undocumented SQL Server 7.0 and 2000 DBCC Commands  Version: 0.00     Price: $0.00  
Total Hits: 45  |  Today: 0Author: Alexander Chigrik      Rating:  
Read Reviews | Write Review |  Your Rating: 

In this article, I want to tell you about some useful undocumented DBCC commands, and how you can use these commands in SQL Server 7.0 and 2000 for administering and monitoring.

DBCC is an abbreviation for Database Console Command. DBCC commands are generally used to check the physical and logical consistency of a database, although they are also used for a variety of miscellaneous tasks, as you will see here....

Some Useful Undocumented SQL Server 7.0 Trace Flags  Version: 0.00     Price: $0.00  
Total Hits: 32  |  Today: 0Author: Alexander Chigrik      Rating:  
Read Reviews | Write Review |  Your Rating: 

In this article, I want to tell you what should you know about some undocumented SQL Server 7.0 trace flags, and how you can use them for administration and monitoring....

SQL Server 7.0 and 2000 Trace Flags  Version: 0.00     Price: $0.00  
Total Hits: 40  |  Today: 0Author: Randy Dyess      Rating:  
Read Reviews | Write Review |  Your Rating: 

Trace flags are used to temporarily enable or disable specific SQL Server database functions, allowing you to change default database behavior or to observe hidden database behavior, and will remain in effect until they are either manually turned off or SQL Server is restarted. Keep in mind that most trace flags are undocumented and Microsoft can and will change the behavior of the flag between SQL Server versions, service packs or hot fixes....

MySQL Tip: MySQL Server Has Gone Away Or Lost connection to server during query Fix  Version: 0.00     Price: $0.00  
Total Hits: 76  |  Today: 0Author: Angsuman Chakraborty      Rating:  
Read Reviews | Write Review |  Your Rating: 

A much dreaded MySQL error message during queries is "MySQL server has gone away". An alternative message is "Lost connection to server during query". This is a strange problem which afflicts a wide variety of PHP software including but not limited to WordPress. There are several causes for it. Let's look at the common and some rare causes and what you can do to fix it....

Connecting to Microsoft SQL Server 2008 from Microsoft Visual Studio 2005 and 2008     
Total Hits: 109  |  Today: 0Author: Jackie Goldstein      Rating:  
Read Reviews | Write Review |  Your Rating: 

Microsoft SQL Server 2008 offers developers an advanced and powerful database engine and comprehensive programming framework with which to create data centric solutions. Since Visual Studio 2008 and 2005 were released before SQL Server 2008, their respective tools and data designers do not automatically support SQL Server 2008 and its new data types and features. Microsoft is providing SQL Server 2008 support updates for Visual Studio in order to allow the designers to communicate with SQL Serve...

Yahoo Geocode, SQL Server 2008 and ASP.NET AJAX     
Total Hits: 405  |  Today: 0Author: Matthew Ellis      Rating:  
Read Reviews | Write Review |  Your Rating: 

Beginning where the article Virtual Earth, SQL Server 2008 and AJAX left off, we’ll add to our real estate application by enabling the insertion of new properties into our SQL Server 2008 database by querying the Yahoo Geocode service to retrieve the longitude and latitude of a specified address....

Access to SQL Server 2008 Virtual Environment     
Total Hits: 302  |  Today: 0Author: Edgewood Solutions Engineers      Rating:  
Read Reviews | Write Review |  Your Rating: 

Back in June 2007, we announced that SQL Server 2008 is on its way in this tip SQL Server 2008 has arrived. In addition, we talked about how to learn more about SQL Server 2008 in this tip Learning SQL Server 2008. The problem with learning something new is that it often takes a lot of time to setup an environment before you can actually do anything. With server virtualization this is much easier to setup and take down servers at will, but this still requires effort to get the virtual server s...

Suspect SQL Server 2000 Database - Part 2     
Total Hits: 526  |  Today: 0Author: Edgewood Solutions Engineers      Rating:  
Read Reviews | Write Review |  Your Rating: 

In your recent tip (Suspect SQL Server 2000 Database) you outlined a suspect database scenario. I took a look at the script and tried to run it in my environment. Unfortunately, this did not resolve my issue. Are you aware of other causes of SQL Server 2000 suspect databases? We have been working through a SOX audit and have been changing permissions at the file system level for our SQL Server. Could this type of change cause a suspect database? The timing of the permission change and the ...

Getting a SQL Server RowCount Without doing a Table Scan     
Total Hits: 533  |  Today: 0Author: Andy Novick      Rating:  
Read Reviews | Write Review |  Your Rating: 

Sometimes there is a need to get record counts from every table in your database. One way of doing this is to do a SELECT count(*) on all of your tables, but this could create a lot of overhead especially for large databases and large tables. If you don't require an exact answer, it isn't necessary to use a SELECT count(*) query on the rows in a table to get the row count....

Build an OLAP Reporting App in ASP.NET Using SQL Server 2000 Analysis Services and Office XP     
Total Hits: 218  |  Today: 0Author: Jeffrey Hasan and Kenneth Tu      Rating:  
Read Reviews | Write Review |  Your Rating: 

Many organizations analyze their business-critical data using Online Analytical Processing (OLAP) technology. OLAP-based data mining provides a way to query multidimensional data sets and drill down into the data to find patterns. ASP.NET and the Microsoft Office Web Components (OWC) enable Web-based OLAP reporting. The OWC controls include PivotTable and Chart components that can be embedded in a Web page and scripted by programmers. In this article, the authors build a Web-based OLAP reporting...

MSDN Webcast: Windows Workflow Foundation: Building Workflow-Enabled Services with Windows Communication Foundation (Level 300)     
Total Hits: 107  |  Today: 0Author: Microsoft      Rating:  
Read Reviews | Write Review |  Your Rating: 

Services and workflows can be used together to build composite applications. For example, a workflow can model the behavior of a composite application by calling out to other services. The behavior of a service, in turn, can also be modeled using a workflow. In this webcast, see how services and workflows fit together naturally in many scenarios. Also, learn how to build workflow-enabled services using the Windows Communication Foundation....

Cyber-Counterintelligence - Just-in-Time Security in Today's Agile IT Architecture     
Total Hits: 279  |  Today: 0      Rating:  
Read Reviews | Write Review |  Your Rating: 

Most companies' secrets are all in a computer somewhere. Yet, guidelines for determining employees' rights of acess to digitized information are typically based solely on behavior models of the "brick and mortar" world. Modeling employee behavior in cyberspace can help companies and other institutions develop more sophisticated methods to ensure real-world business IT security. In this session, Michael Theis, chief of Cyber Counterintelligence for the National Reconnaissance Office, will discuss...

MSDN Webcast: Building a Sudoku Game Using Windows Presentation Foundation (Part 5 of 5) (Level 100)     
Total Hits: 129  |  Today: 0Author: Microsoft      Rating:  
Read Reviews | Write Review |  Your Rating: 

In Part 5 of this webcast series, you learn how to build an interface for your Sudoku game to load and benchmark multiple AIs, as well as a custom graphing component that compares the AIs....

MSDN Webcast: Security Best Practices: User Input Validation (Level 200)     
Total Hits: 248  |  Today: 0Author: Joe Stagner      Rating:  
Read Reviews | Write Review |  Your Rating: 

User input is the largest single source of malicious activity against your application. In this webcast we address best practices for filtering your user input and assuring only intended input is allowed to enter your application. We review validation controls, regular expressions, strong typing and more....

MSDN Webcast: Using Secure Coding Best Practices (Level 200)     
Total Hits: 204  |  Today: 0Author: Joe Stagner      Rating:  
Read Reviews | Write Review |  Your Rating: 

Help protect your applications against the most common attacks by learning how to code defensively. Any user input might be malicious, and your application must carefully examine it and accept only valid requests. This webcast explains how write code that is ready when attackers intentionally submit invalid data. When that happens, the application should display friendly error messages to end users, including the attackers, without revealing information about itself or the server. Join this webc...



Disclaimer - Privacy
© 2002-2017 DevASP.net