Label:Text: Toward Dba[mssql] Improve access performance of databases from the perspective of SQL statementsRecently the company has come to a very tiger DBA 10几 years of experience here is called Cai Teacher. Let us share the precious wealth that Cai Lao has brought to us, with the consent of our Chua. Welcome other DBAs to shoot bricksDirectory1. What is the ex
them by the last update time. Run the following statement: SELECT * from sys.objects where type in (' U ', ' V ', ' P ') Order by modify_dateThis statement identifies all the user tables, views, and stored procedures in the database and sorts them by time, so that you can see others recently added and modified those database objects. Sys.objects does not contain triggers, and triggers are in sys.triggers. There are similar sys.tables,sys.views and so on. Information_schemaIf we want to quickly
the checkpoint process if the time specified is short. Typically, the "dirty" page is written to disk, and Lazy writer has a lot more to do than checkpoint. Summary This article briefly describes the concept of Wal and the role that logs play when modifying database objects. Checkpoint and Lazy Writer are also described, and the understanding of these concepts is the basis for understanding SQL Server
After so many years of mixing in the forum, we have seen an obvious trend: more and more netizens are using VFP and SQL server for the system. Many people are concerned about how to operate or manage SQL Server from VFP. You can use views, SPT, or ADO to perform data operations on
Artificial Intelligence automatic SQL optimization tools-SQLTuning for SQL Server, SQL-sqltuning
In response to this situation, the artificial intelligence automatic SQL optimization tool came into being. Now I will introduce this tool: SQLTuning for
only one thread at the same time. The latch itself is a special version of the critical section because it allows multiple concurrent read operations. In the context of SQL Server, this means that multiple threads can concurrently read a shared data structure, such as pages in the memory, but the write shared data structure must be performed by a single thread.
The locks are used to coordinate the physical
Tags: style blog http io color using SP strong fileData backup has always been considered a database of life, that is, one of the main skills of a DBA, this article is about the SQL Server backup principle, the SQL Server database is divided into data files and log files. To
Registered servers window:
You can use SSMs to register multiple servers and connect them, so that DBA can manage multiple local or remote servers in one environment. The registered servers window is invisible by default. to display it, click the View menu to select the registered servers option, or press the shortcut key CTRL + ALT + G.
Right-click any location in the registered servers window, open the context menu, register a new
Note: Synchronize updates in your blog
Comprehensive
SQL Server Skills-Immerse yourself in SQL server (a collection)
Featured Database Articles (itself an aggregation) SQL Server @ DatabaseJournal
To successfully access data in a SQL Server database, we need two aspects of authorization:
Get permission to connect to the SQL Server server;
The right to access data in a particular database (SELECT, Update, delete, CREATE TABLE ...) )。
Suppose we are go
Tags: var Select prim object Create disable SQL not ISA1. Start the login account at the SQL Server server level (create login)--Creating login account (Create login)Create login DBA with password= ' [email protected] ', Default_database=mydbLogin account Name: "
server| Security
The recent SQL injection attack test intensified, many large websites and forums have been injected successively. These sites typically use a SQL Server database, which is why many people are beginning to suspect SQL S
server| Security
The recent SQL injection attack test intensified, many large websites and forums have been injected successively. These sites typically use a SQL Server database, which is why many people are beginning to suspect SQL Ser
Original: http://www.cnblogs.com/xwdreamer/archive/2012/06/25/2562828.html bibliographyHttp://database.51cto.com/art/201009/224075.htmBodyTo successfully access data in a SQL Server database, we need two aspects of authorization:
Get permission to connect to the SQL Server
Introduction
Sp_who2 is a well known utility that shows what spids are currently executing. however the information it shows is relatively limited. for example, it only shows the type of command executing as select, delete etc, with no reference to the actual underlying SQL executing.
Knowing what SQL is executing can be vital in debugging why a query is taking a long time, or determining if it is being blo
successfully connect to some tools but fail to use other tools, it is likely to be a driver problem. You can also use "\ windows \ system32 \ odbcad32.exe" (embedded in Windows) to test the connection by adding a new DSN for different drivers, but this is only valid for ODBC. Step 5: Application Problems
If the previous four steps are successful but you still see an error in your application, it is likely that this is caused by connection issues in your application. Consider the following possi
Enforce password policy when you run SQL Server on a Windows version before Windows Server 2003. However, SQL Server uses the default setting of a minimum length of six characters, and checks that the password does not match all parts or any part of the login, and is a comb
18. Create and use a view tableView tableView table conceptsCreate a viewModify and delete a tableEnhanced viewing table functionality in SQL Server 2000SummaryIn Chapter 17th, we learned about indexes. indexes are a secondary database structure independent of the database data structure, but they are related to accessing database data. In other words, an index is an independent structure, but is integrated
If you are in charge of a SQL Server-based project or you have just been in touch with SQL Server, you may have to face some database performance problems, this article will provide you with some useful guidance (most of which can also be used for other DBMS ).Here, I am not going to introduce the tips for using
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.