Get started

Bring yourself up to speed with our introductory content.

Get started

Bring yourself up to speed with our introductory content.

  • Debugging CLR database objects

    One significant feature found in the integration of .NET Framework, Visual Studio 2005, and SQL Server 2005 is the ability to debug the CLR database objects that you create. Find out more in this chapter excerpt. Continue Reading

  • User-Defined Functions

    Creating .NET-based user-defined functions (UDFs) is another new feature that's enabled by the integration of the .NET CLR. Learn more about them in this chapter excerpt. Continue Reading

  • User-Defined Types

    Another important new feature in SQL Server 2005 that is enabled by the integration of the .NET CLR is the ability to create true user-defined types (UDTs). Learn the best ways to utilize them in this chapter excerpt. Continue Reading

  • CLR architecture

    The .NET Framework CLR is very tightly integrated with the SQL Server 2005 database engine. In fact, the SQL Server database engine hosts the CLR. This gives SQL Server 2005 several distinct advantages over the .NET integration that's provided by ... Continue Reading

  • CLR stored procedures

    Stored procedures are one of the most common database objects that you'll want to create using one of the managed .NET languages. One of the best uses for CLR stored procedures is to replace existing extended stored procedures. Learn the best ... Continue Reading

  • FAQ: DTS packages in SQL Server

    Since the release of SQL Server 2005, the spotlight has been on SQL Server Integration Services (SSIS) as it is the new and powerful ETL tool (short for extraction, transforming and loading). SSIS is making managing SQL Server data a more customized...Continue Reading

  • Table variables

    Table variables are similar to temporary tables and are declared using the table data type. This following book excerpt contains further explanations and examples for declaring table variables when working T-SQL programming constructs.Continue Reading

  • Global variables

    Your SQL Server maintains values in global variables. They carry information specific to the server or user session and can be examined from anywhere and return one value. Get more on this and how global variables begin with the @@ prefix and do not...Continue Reading

  • T-SQL identifiers

    T-SQL Identifiers are used in all databases, servers and database objects in SQL Server. Identifiers are assigned to identify and object when it is created, but can be changed after. Rules and tips for creating identifiers are outlined in the ...Continue Reading

  • Local variables

    SQL Server 2005 recognizes only local and table variables. This book except outlines operations such as declaring variables, assigning values with the select, set, or update statement; and displaying values. Also find some workarounds for potential ...Continue Reading

  • Flow control statements

    T-SQL flow-control statements require skill and lack user friendliness, yet they allow for complex procedures. This book excerpt covers the use of comments. Comments can be included inside the source code of a batch or stored procedure. Comments ...Continue Reading

  • Database object qualifiers

    The name of a database object has four identifiers. These identifiers must comply with the rules for T-SQL identifiers. This is referred to as the object's fully qualified name. The following excerpt outlines the different schemas that can be ...Continue Reading

  • Blocks, looping and conditional flow control statements

    Statements blocks (Begin…End) can be used to group several statements to be executed together. Conditional execution (If statements) are used to change the flow of code based on the value of a condition. T-SQL contains only one statement that...Continue Reading

  • Problems and justified use of cursors

    The use of cursors in T-SQL should traditionally be avoided when possible, as they are a procedural feature and performace penalties tend to be a problem. However, this excerpt outlines situations in which cursors are acceptable, and even necessary.Continue Reading

  • Character string data types

    There are four different character data types that store character strings: char, varchar, varchar(max), and text. There are also four character data types for storing unicode data: nchar, nvarchar, nvarchar(max) and ntext. This book excerpt on ...Continue Reading

  • Transact SQL cursors

    T-SQL cursors are used to repeat custom processing for each row of the cursor. The following excerpt outlines how to process a cursor for Transact-SQL Server and gives an example.Continue Reading

  • Date, time and number data types in SQL Server

    In this book excerpt on basic T-SQL programming constructs, date and time, integer numbers, approximate numbers, exact numbers, monetary and binary data types are defined and examples given.Continue Reading

  • FAQ: SQL Server query errors and explanations

    Queries in SQL Server have many daunting components. To ease the pain of running a query we've compiled a dozen Frequently Asked Questions. Here, our experts address areas including how to fix code errors, speed up queries, show the query navigation...Continue Reading

  • FAQ: SQL Server login and permissions troubleshooting

    Monitor failed logins, restrict account access or solve a permissions issue with these 10 SQL Server security FAQs.Continue Reading

  • ACID (atomicity, consistency, isolation, and durability)

    ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).Continue Reading

  • Yukon

    Yukon is the code name used for the beta version of Microsoft's SQL Server 2005. SQL Server 2005 is said to provide enhanced flexibility, scalability, reliability, and security to database applications, and to make them easier to create and deploy, ...Continue Reading

  • OLE DB (OLEDB or Object Linking and Embedding Database)

    OLE DB is Microsoft's strategic low-level application program interface (API) for access to different data sources.Continue Reading

  • CORBA (Common Object Request Broker Architecture)

    Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.Continue Reading

  • C++

    C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.Continue Reading

  • ActiveX Data Objects (ADO)

    ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers.Continue Reading

  • comma-separated values file (CSV)

    In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.Continue Reading

  • Database: Glossary

    This is a glossary of database-related terms.Continue Reading

  • Fast Guide: SQL Server 2000 commands

    Here are ten commands you need to know!Continue Reading

  • Learning Guide: SQL Server performance tuning A to Z

    From testing and monitoring to tuning and troubleshooting, you're sure to find a tip or tool to help you resolve your SQL Server performance dilemmas in this guide.Continue Reading

  • meta

    Metadata is a description of data.Continue Reading

  • full-text database

    A full-text database is a compilation of documents or other information in the form of a database in which the complete text of each referenced document is available for online viewing, printing, or downloading. In addition to text documents, images...Continue Reading

  • Versioned Object Base (VOB)

    A Versioned Object Base (VOB) is a centralized database that stores version information about the files and folders in a software configuration management (SCM) system.Continue Reading

  • record standardization

    In data management, record standardization is a process in which files are first parsed (assigned to appropriate fields in a database record) and then translated to a common format.Continue Reading

  • library

    In computing, a library is a collection of similar objects that are stored for occasional use - most frequently, programs in source code or object code form, data files, scripts, templates, fonts, and physical storage units such as tape cartridges.Continue Reading

  • contiguous

    Contiguous describes two or more objects that are adjacent to each other.Continue Reading

  • data corruption

    Data corruption is the deterioration of computer data as a result of some external agent.Continue Reading

  • XQuery

    XQuery is a specification for a query language that allows a user or programmer to extract information from an Extensible Markup Language (XML) file or any collection of data that can be XML-like.Continue Reading

  • MOLAP (multidimensional online analytical processing)

    MOLAP (multidimensional online analytical processing) is online analytical processing (OLAP) that indexes directly into a multidimensional database.Continue Reading

  • DDBMS (distributed database management system)

    A DDBMS (distributed database management system) is a centralized application that manages a distributed database as if it were all stored on the same computer.Continue Reading

  • segment

    A segment is a defined portion or section of something larger such as a database, geometric object, or network.Continue Reading

  • initial extent

    The initial extent is a set of contiguous blocks in a database segment that is automatically allocated when the segment is created.Continue Reading

  • block

    A block is a contiguous set of bits or bytes that forms an identifiable unit of data.Continue Reading

  • view

    In a database management system, a view is a way of portraying information in the database.Continue Reading

  • entity-relationship model (ERM or ER model)

    The entity-relationship model (or ER model) is a way of graphically representing the logical relationships of entities (or objects) in order to create a database.Continue Reading

  • binary tree

    A binary tree is a method of placing and locating files (called records or keys) in a database, especially when all the data is known to be in random access memory (RAM).Continue Reading

  • catalog

    In computing, a catalog is a directory of information about data sets, files, or a database.Continue Reading

  • GIS (geographic information system)

    A GIS (geographic information system) enables you to envision the geographic aspects of a body of data.Continue Reading

  • Universal Data Access (UDA)

    Universal Data Access (UDA) is Microsoft's model or framework for a single uniform application program interface to different software makers' databases, both relational and nonrelational.Continue Reading

  • B-tree

    A B-tree is a method of placing and locating files (called records or keys) in a database.Continue Reading

  • commit

    A commit is the final step in the successful completion of a previously started database change as part of handling a transaction in a computing system.Continue Reading

  • Collaboration Data Objects (CDO)

    Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.Continue Reading

  • trigger

    A trigger (from the Dutch trekken, meaning to pull) is a lever which, when pulled by the finger, releases the hammer on a firearm.Continue Reading

  • hybrid online analytical processing (HOLAP or Hybrid OLAP)

    Hybrid online analytical processing (HOLAP) is a combination of relational OLAP (ROLAP) and multidimensional OLAP (usually referred to simply as OLAP).Continue Reading

  • information

    Information is stimuli that has meaning in some context for its receiver.Continue Reading

  • hashing

    Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.Continue Reading

  • schema

    In computer programming, a schema (pronounced SKEE-mah) is the organization or structure for a database.Continue Reading

  • rollback

    A rollback is the undoing of partly completed database changes when a database transaction is determined to have failed.Continue Reading

  • replication

    Replication (pronounced rehp-lih-KA-shun) is the process of making a replica (a copy) of something.Continue Reading

  • Commerce XML (cXML or Commerce Extensible Markup Language)

    Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.Continue Reading

  • application server

    An application server is a server program in a computer in a distributed network that provides the business logic for an application program.Continue Reading

  • primary key (primary keyword)

    A primary key, also called a primary keyword, is a key in a relational database that is unique for each record.Continue Reading

  • BLOB (binary large object)

    In computers, a BLOB (binary large object), pronounced BLAHB and sometimes spelled in all lower case, is a large file, typically an image or sound file, that must be handled (for example, uploaded, downloaded, or stored in a database) in a special ...Continue Reading

  • intelligent database

    An intelligent database is a full-text database that employs artficial intelligence (AI), interacting with users to ensure that returned items (hits) contain the most relevant information possible. This is in contrast to a traditional database, ...Continue Reading

  • EDM (Electronic Document Management)

    EDM (Electronic Document Management) is the management of different kinds of documents in an enterprise using computer programs and storage.Continue Reading

  • AS1 (Applicability Statement 1)

    AS1 (Applicability Statement is a specification for Electronic Data Interchange (EDI) communications between businesses using e-mail protocols.Continue Reading

  • Java container

    In Sun Microsystems' JavaBeans component architecture and in Microsoft's Component Object Model (COM), a container is an application program or subsystem in which the program building block known as a component is run.Continue Reading

  • ECMAScript (European Computer Manufacturers Association Script)

    ECMAScript is a standard script language, developed with the cooperation of Netscape and Microsoft and mainly derived from Netscape's JavaScript, the widely-used scripting language that is used in Web pages to affect how they look or behave for the ...Continue Reading

  • OPAC (Online Public Access Catalog)

    An OPAC (Online Public Access Catalog) is an online bibliography of a library collection that is available to the public.Continue Reading

  • data hiding

    Data hiding is a characteristic of object-oriented programming.Continue Reading

  • DSTP (Data Space Transfer Protocol)

    DSTP (Data Space Transfer Protocol) is a protocol that is used to index and retrieve data from a number of databases, files, and other data structures using a key that can find all the related data about a particular object across all of the data.Continue Reading

  • drilldown

    As currently used in information technology, to drill down (verb) is to focus in on something.Continue Reading

  • ODL (Open and Distance Learning)

    Open and Distance Learning (ODL) is a general term for the use of telecommunication to provide or enhance learning.Continue Reading

  • DAO (Data Access Objects)

    DAO (Data Access Objects) is an application program interface (API) available with Microsoft's Visual Basic that lets a programmer request access to a Microsoft Access database.Continue Reading

  • contiguity

    Contiguity (from Latin contiguus and contingere, to have contact with) is the state of being in close proximity with or even touching another object.Continue Reading

  • fetch

    In computer technology, fetch has several meanings related to getting, reading, or moving data objects.Continue Reading

  • Ingres

    Ingres is a relational database management system (RDBMS) that evolved from a research project at the University of California at Berkeley in the 1970s.Continue Reading